Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-10044 (GCVE-0-2016-10044)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T03:07:32.042Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7"
},
{
"name": "1037798",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1037798"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://source.android.com/security/bulletin/2017-02-01.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"name": "96122",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/96122"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2016-10044",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-21T13:08:15.380102Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-21T13:14:17.686Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-04-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-24T12:57:01",
"orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
"shortName": "google_android"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7"
},
{
"name": "1037798",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1037798"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://source.android.com/security/bulletin/2017-02-01.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"name": "96122",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/96122"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-10044",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7"
},
{
"name": "1037798",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037798"
},
{
"name": "http://source.android.com/security/bulletin/2017-02-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2017-02-01.html"
},
{
"name": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"name": "96122",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96122"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
"assignerShortName": "google_android",
"cveId": "CVE-2016-10044",
"datePublished": "2017-02-07T07:02:00",
"dateReserved": "2016-12-26T00:00:00",
"dateUpdated": "2024-10-21T13:14:17.686Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2016-10044\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2017-02-07T07:59:00.293\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n aio_mount en fs/aio.c en el kernel de Linux en versiones anteriores a 4.7.7 no restringe adecuadamente el acceso de ejecuci\u00f3n, lo que facilita a usuarios locales eludir restricciones de pol\u00edtica destinadas SELinux W^X, y consecuentemente obtener privilegios, a trav\u00e9s de una llamada de sistema io_setup.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.16.43\",\"matchCriteriaId\":\"EE61EB40-EE9C-41E8-AC78-D38441DB9CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"4.4.24\",\"matchCriteriaId\":\"21856BF4-4072-4055-BA57-93D5C4608C07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.7.7\",\"matchCriteriaId\":\"004A2488-AD73-4B53-961A-EEA808A5183D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.1.1\",\"matchCriteriaId\":\"0F11609D-D1B4-4DD6-8CC7-A224344E1E67\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\",\"source\":\"security@android.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://source.android.com/security/bulletin/2017-02-01.html\",\"source\":\"security@android.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\",\"source\":\"security@android.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/96122\",\"source\":\"security@android.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037798\",\"source\":\"security@android.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\",\"source\":\"security@android.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://source.android.com/security/bulletin/2017-02-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/96122\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037798\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1037798\", \"name\": \"1037798\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}, {\"url\": \"http://source.android.com/security/bulletin/2017-02-01.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/96122\", \"name\": \"96122\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T03:07:32.042Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2016-10044\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-21T13:08:15.380102Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-21T13:08:18.505Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2016-04-27T00:00:00\", \"references\": [{\"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securitytracker.com/id/1037798\", \"name\": \"1037798\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}, {\"url\": \"http://source.android.com/security/bulletin/2017-02-01.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/96122\", \"name\": \"96122\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6\", \"shortName\": \"google_android\", \"dateUpdated\": \"2017-07-24T12:57:01\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"n/a\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\", \"name\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securitytracker.com/id/1037798\", \"name\": \"1037798\", \"refsource\": \"SECTRACK\"}, {\"url\": \"http://source.android.com/security/bulletin/2017-02-01.html\", \"name\": \"http://source.android.com/security/bulletin/2017-02-01.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"name\": \"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"name\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securityfocus.com/bid/96122\", \"name\": \"96122\", \"refsource\": \"BID\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2016-10044\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"security@android.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2016-10044\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-21T13:14:17.686Z\", \"dateReserved\": \"2016-12-26T00:00:00\", \"assignerOrgId\": \"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6\", \"datePublished\": \"2017-02-07T07:02:00\", \"assignerShortName\": \"google_android\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2017-AVI-307
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-7097",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7097"
},
{
"name": "CVE-2017-10663",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10663"
},
{
"name": "CVE-2017-8831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8831"
},
{
"name": "CVE-2017-7472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7472"
},
{
"name": "CVE-2017-6346",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6346"
},
{
"name": "CVE-2017-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12762"
},
{
"name": "CVE-2016-8650",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8650"
},
{
"name": "CVE-2017-6951",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6951"
},
{
"name": "CVE-2017-5970",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5970"
},
{
"name": "CVE-2016-10200",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10200"
},
{
"name": "CVE-2017-1000251",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000251"
},
{
"name": "CVE-2016-9178",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9178"
},
{
"name": "CVE-2017-6214",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6214"
},
{
"name": "CVE-2016-9083",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9083"
},
{
"name": "CVE-2016-9754",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9754"
},
{
"name": "CVE-2017-7541",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7541"
},
{
"name": "CVE-2016-10044",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10044"
},
{
"name": "CVE-2017-7187",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7187"
},
{
"name": "CVE-2016-9191",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9191"
},
{
"name": "CVE-2016-9604",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9604"
},
{
"name": "CVE-2016-9084",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9084"
}
],
"initial_release_date": "2017-09-19T00:00:00",
"last_revision_date": "2017-09-19T00:00:00",
"links": [],
"reference": "CERTFR-2017-AVI-307",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-09-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3420-1 du 18 septembre 2017",
"url": "https://usn.ubuntu.com/usn/usn-3420-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3422-2 du 18 septembre 2017",
"url": "https://usn.ubuntu.com/usn/usn-3422-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3423-1 du 18 septembre 2017",
"url": "https://usn.ubuntu.com/usn/usn-3423-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3419-2 du 18 septembre 2017",
"url": "https://usn.ubuntu.com/usn/usn-3419-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3422-1 du 18 septembre 2017",
"url": "https://usn.ubuntu.com/usn/usn-3422-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3419-1 du 18 septembre 2017",
"url": "https://usn.ubuntu.com/usn/usn-3419-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu usn-3420-2 du 18 septembre 2017",
"url": "https://usn.ubuntu.com/usn/usn-3420-2/"
}
]
}
suse-su-2017:1360-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive various security and bugfixes.\n\nNotable new/improved features:\n- Improved support for Hyper-V\n- Support for the tcp_westwood TCP scheduling algorithm\n\nThe following security bugs were fixed:\n\n- CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel allowed privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer (bsc#1035877).\n- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the \u0027dead\u0027 type. (bsc#1029850).\n- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c. (bsc#1030593)\n- CVE-2016-9604: This fixes handling of keyrings starting with \u0027.\u0027 in KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to manipulate privileged keyrings (bsc#1035576)\n- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation. (bnc#1033336).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670).\n- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)\n- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)\n- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)\n- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)\n- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)\n- CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanaged the #BP and #OF exceptions, which allowed guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest (bsc#1015703).\n- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914).\n- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)\n- CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel did not properly validate meta block groups, which allowed physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image (bnc#1023377).\n- CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allowed remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access (bsc#1023762).\n- CVE-2017-5986: A race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235).\n- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)\n- CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application (bnc#1008842)\n- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178).\n- CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel did not properly restrict execute access, which made it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call (bnc#1023992).\n- CVE-2016-3070: The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel improperly interacts with mm/migrate.c, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move (bnc#979215).\n- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212).\n- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190)\n- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189)\n- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066)\n- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235).\n- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)\n- CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697)\n- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bsc#914939).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003077).\n\nThe following non-security bugs were fixed:\n\n- ACPI / APEI: Fix NMI notification handling (bsc#917630).\n- arch: Mass conversion of smp_mb__*() (bsc#1020795).\n- asm-generic: add __smp_xxx wrappers (bsc#1020795).\n- block: remove struct request buffer member (bsc#1020795).\n- block: submit_bio_wait() conversions (bsc#1020795).\n- bonding: Advertize vxlan offload features when supported (bsc#1009682).\n- bonding: handle more gso types (bsc#1009682).\n- bonding: use the correct ether type for alb (bsc#1028595).\n- btrfs: allow unlink to exceed subvolume quota (bsc#1015821).\n- btrfs: Change qgroup_meta_rsv to 64bit (bsc#1015821).\n- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).\n- btrfs: make file clone aware of fatal signals (bsc#1015787).\n- btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1015821).\n- cancel the setfilesize transation when io error happen (bsc#1028648).\n- cgroup: remove stray references to css_id (bsc#1020795).\n- cpuidle: powernv/pseries: Auto-promotion of snooze to deeper idle state (bnc#1023164).\n- dm: add era target (bsc#1020795).\n- dm: allow remove to be deferred (bsc#1020795).\n- dm bitset: only flush the current word if it has been dirtied (bsc#1020795).\n- dm btree: add dm_btree_find_lowest_key (bsc#1020795).\n- dm cache: actually resize cache (bsc#1020795).\n- dm cache: add block sizes and total cache blocks to status output (bsc#1020795).\n- dm cache: add cache block invalidation support (bsc#1020795).\n- dm cache: add passthrough mode (bsc#1020795).\n- dm cache: add policy name to status output (bsc#1020795).\n- dm cache: add remove_cblock method to policy interface (bsc#1020795).\n- dm cache: be much more aggressive about promoting writes to discarded blocks (bsc#1020795).\n- dm cache: cache shrinking support (bsc#1020795).\n- dm cache: do not add migration to completed list before unhooking bio (bsc#1020795).\n- dm cache: fix a lock-inversion (bsc#1020795).\n- dm cache: fix truncation bug when mapping I/O to more than 2TB fast device (bsc#1020795).\n- dm cache: fix writethrough mode quiescing in cache_map (bsc#1020795).\n- dm cache: improve efficiency of quiescing flag management (bsc#1020795).\n- dm cache: io destined for the cache device can now serve as tick bios (bsc#1020795).\n- dm cache: log error message if dm_kcopyd_copy() fails (bsc#1020795).\n- dm cache metadata: check the metadata version when reading the superblock (bsc#1020795).\n- dm cache metadata: return bool from __superblock_all_zeroes (bsc#1020795).\n- dm cache: move hook_info into common portion of per_bio_data structure (bsc#1020795).\n- dm cache: optimize commit_if_needed (bsc#1020795).\n- dm cache policy mq: a few small fixes (bsc#1020795).\n- dm cache policy mq: fix promotions to occur as expected (bsc#1020795).\n- dm cache policy mq: implement writeback_work() and mq_{set,clear}_dirty() (bsc#1020795).\n- dm cache policy mq: introduce three promotion threshold tunables (bsc#1020795).\n- dm cache policy mq: protect residency method with existing mutex (bsc#1020795).\n- dm cache policy mq: reduce memory requirements (bsc#1020795).\n- dm cache policy mq: use list_del_init instead of list_del + INIT_LIST_HEAD (bsc#1020795).\n- dm cache policy: remove return from void policy_remove_mapping (bsc#1020795).\n- dm cache: promotion optimisation for writes (bsc#1020795).\n- dm cache: resolve small nits and improve Documentation (bsc#1020795).\n- dm cache: return -EINVAL if the user specifies unknown cache policy (bsc#1020795).\n- dm cache: use cell_defer() boolean argument consistently (bsc#1020795).\n- dm: change sector_count member in clone_info from sector_t to unsigned (bsc#1020795).\n- dm crypt: add TCW IV mode for old CBC TCRYPT containers (bsc#1020795).\n- dm crypt: properly handle extra key string in initialization (bsc#1020795).\n- dm delay: use per-bio data instead of a mempool and slab cache (bsc#1020795).\n- dm: fix Kconfig indentation (bsc#1020795).\n- dm: fix Kconfig menu indentation (bsc#1020795).\n- dm: make dm_table_alloc_md_mempools static (bsc#1020795).\n- dm mpath: do not call pg_init when it is already running (bsc#1020795).\n- dm mpath: fix lock order inconsistency in multipath_ioctl (bsc#1020795).\n- dm mpath: print more useful warnings in multipath_message() (bsc#1020795).\n- dm mpath: push back requests instead of queueing (bsc#1020795).\n- dm mpath: really fix lockdep warning (bsc#1020795).\n- dm mpath: reduce memory pressure when requeuing (bsc#1020795).\n- dm mpath: remove extra nesting in map function (bsc#1020795).\n- dm mpath: remove map_io() (bsc#1020795).\n- dm mpath: remove process_queued_ios() (bsc#1020795).\n- dm mpath: requeue I/O during pg_init (bsc#1020795).\n- dm persistent data: cleanup dm-thin specific references in text (bsc#1020795).\n- dm snapshot: call destroy_work_on_stack() to pair with INIT_WORK_ONSTACK() (bsc#1020795).\n- dm snapshot: fix metadata corruption (bsc#1020795).\n- dm snapshot: prepare for switch to using dm-bufio (bsc#1020795).\n- dm snapshot: use dm-bufio (bsc#1020795).\n- dm snapshot: use dm-bufio prefetch (bsc#1020795).\n- dm snapshot: use GFP_KERNEL when initializing exceptions (bsc#1020795).\n- dm space map disk: optimise sm_disk_dec_block (bsc#1020795).\n- dm space map metadata: limit errors in sm_metadata_new_block (bsc#1020795).\n- dm: stop using bi_private (bsc#1020795).\n- dm table: add dm_table_run_md_queue_async (bsc#1020795).\n- dm table: print error on preresume failure (bsc#1020795).\n- dm table: remove unused buggy code that extends the targets array (bsc#1020795).\n- dm thin: add error_if_no_space feature (bsc#1020795).\n- dm thin: add mappings to end of prepared_* lists (bsc#1020795).\n- dm thin: add \u0027no_space_timeout\u0027 dm-thin-pool module param (bsc#1020795).\n- dm thin: add timeout to stop out-of-data-space mode holding IO forever (bsc#1020795).\n- dm thin: allow metadata commit if pool is in PM_OUT_OF_DATA_SPACE mode (bsc#1020795).\n- dm thin: allow metadata space larger than supported to go unused (bsc#1020795).\n- dm thin: cleanup and improve no space handling (bsc#1020795).\n- dm thin: eliminate the no_free_space flag (bsc#1020795).\n- dm thin: ensure user takes action to validate data and metadata consistency (bsc#1020795).\n- dm thin: factor out check_low_water_mark and use bools (bsc#1020795).\n- dm thin: fix deadlock in __requeue_bio_list (bsc#1020795).\n- dm thin: fix noflush suspend IO queueing (bsc#1020795).\n- dm thin: fix out of data space handling (bsc#1020795).\n- dm thin: fix pool feature parsing (bsc#1020795).\n- dm thin: fix rcu_read_lock being held in code that can sleep (bsc#1020795).\n- dm thin: handle metadata failures more consistently (bsc#1020795).\n- dm thin: irqsave must always be used with the pool-\u003elock spinlock (bsc#1020795).\n- dm thin: log info when growing the data or metadata device (bsc#1020795).\n- dm thin: requeue bios to DM core if no_free_space and in read-only mode (bsc#1020795).\n- dm thin: return error from alloc_data_block if pool is not in write mode (bsc#1020795).\n- dm thin: simplify pool_is_congested (bsc#1020795).\n- dm thin: sort the per thin deferred bios using an rb_tree (bsc#1020795).\n- dm thin: synchronize the pool mode during suspend (bsc#1020795).\n- dm thin: use bool rather than unsigned for flags in structures (bsc#1020795).\n- dm thin: use INIT_WORK_ONSTACK in noflush_work to avoid ODEBUG warning (bsc#1020795).\n- dm thin: use per thin device deferred bio lists (bsc#1020795).\n- dm: use RCU_INIT_POINTER instead of rcu_assign_pointer in __unbind (bsc#1020795).\n- drm/i915: relax uncritical udelay_range() (bsc#1038261).\n- ether: add loopback type ETH_P_LOOPBACK (bsc#1028595).\n- ext4: fix bh leak on error paths in ext4_rename() and ext4_cross_rename() (bsc#1012985).\n- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).\n- ext4: mark inode dirty after converting inline directory (bsc#1012985).\n- ftrace: Make ftrace_location_range() global (FATE#322421).\n- HID: usbhid: improve handling of Clear-Halt and reset (bsc#1031080).\n- hv: util: catch allocation errors\n- hv: utils: use memdup_user in hvt_op_write\n- hwrng: virtio - ensure reads happen after successful probe (bsc#954763 bsc#1032344).\n- i40e: avoid null pointer dereference (bsc#922853).\n- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561).\n- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).\n- i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).\n- i40e: Impose a lower limit on gso size (bsc#985561).\n- i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).\n- iommu/vt-d: Flush old iommu caches for kdump when the device gets context mapped (bsc#1023824).\n- iommu/vt-d: Tylersburg isoch identity map check is done too late (bsc#1032125).\n- ipv6: make ECMP route replacement less greedy (bsc#930399).\n- kabi: hide changes in struct sk_buff (bsc#1009682).\n- KABI: Hide new include in arch/powerpc/kernel/process.c (fate#322421).\n- kABI: mask struct xfs_icdinode change (bsc#1024788).\n- kABI: protect struct inet6_dev (kabi).\n- kABI: protect struct iscsi_conn (bsc#103470).\n- kABI: protect struct xfs_buftarg and struct xfs_mount (bsc#1024508).\n- kABI: restore can_rx_register parameters (kabi).\n- kernel/watchdog: use nmi registers snapshot in hardlockup handler (bsc#940946, bsc#937444).\n- kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).\n- kgr/module: make a taint flag module-specific\n- kgr: remove unneeded kgr_needs_lazy_migration() s390x definition\n- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).\n- l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).\n- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415).\n- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415).\n- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).\n- l2tp: lock socket before checking flags in connect() (bsc#1028415).\n- livepatch: Allow architectures to specify an alternate ftrace location (FATE#322421).\n- locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).\n- md: avoid oops on unload if some process is in poll or select (bsc#1020795).\n- md: Convert use of typedef ctl_table to struct ctl_table (bsc#1020795).\n- md: ensure metadata is writen after raid level change (bsc#1020795).\n- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).\n- md: md_clear_badblocks should return an error code on failure (bsc#1020795).\n- md: refuse to change shape of array if it is active but read-only (bsc#1020795).\n- megaraid_sas: add missing curly braces in ioctl handler (bsc#1023207).\n- megaraid_sas: Fixup tgtid count in megasas_ld_list_query() (bsc#971933).\n- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).\n- mm, memcg: do not retry precharge charges (bnc#1022559).\n- mm/mempolicy.c: do not put mempolicy before using its nodemask (References: VM Performance, bnc#931620).\n- mm/page_alloc: fix nodes for reclaim in fast path (bnc#1031842).\n- module: move add_taint_module() to a header file\n- net: Add skb_gro_postpull_rcsum to udp and vxlan (bsc#1009682).\n- net: add skb_pop_rcv_encapsulation (bsc#1009682).\n- net: Call skb_checksum_init in IPv4 (bsc#1009682).\n- net: Call skb_checksum_init in IPv6 (bsc#1009682).\n- netfilter: allow logging fron non-init netns (bsc#970083).\n- net: Generalize checksum_init functions (bsc#1009682).\n- net: Preserve CHECKSUM_COMPLETE at validation (bsc#1009682).\n- NFS: do not try to cross a mountpount when there isn\u0027t one there (bsc#1028041).\n- NFS: Expedite unmount of NFS auto-mounts (bnc#1025802).\n- NFS: Fix a performance regression in readdir (bsc#857926).\n- NFS: flush out dirty data on file fput() (bsc#1021762).\n- ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1012985).\n- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).\n- powerpc: Create a helper for getting the kernel toc value (FATE#322421).\n- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).\n- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).\n- powerpc/fadump: Update fadump documentation (bsc#1032141).\n- powerpc/ftrace: Add Kconfig \u0026 Make glue for mprofile-kernel (FATE#322421).\n- powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI (FATE#322421).\n- powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace (FATE#322421).\n- powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).\n- powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).\n- powerpc/kgraft: Add kgraft header (FATE#322421).\n- powerpc/kgraft: Add kgraft stack to struct thread_info (FATE#322421).\n- powerpc/kgraft: Add live patching support on ppc64le (FATE#322421).\n- powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).\n- powerpc/module: Mark module stubs with a magic value (FATE#322421).\n- powerpc/module: Only try to generate the ftrace_caller() stub once (FATE#322421).\n- powerpc/modules: Never restore r2 for a mprofile-kernel style mcount() call (FATE#322421).\n- powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530).\n- powerpc/pseries/cpuidle: Remove MAX_IDLE_STATE macro (bnc#1023164).\n- powerpc/pseries/cpuidle: Use cpuidle_register() for initialisation (bnc#1023164).\n- powerpc: Reject binutils 2.24 when building little endian (boo#1028895).\n- RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#982783,bsc#1020048).\n- raid1: include bio_end_io_list in nr_queued to prevent freeze_array hang\n- remove mpath patches from dmcache backport, for bsc#1035738\n- revert \u0027procfs: mark thread stack correctly in proc/PID/maps\u0027 (bnc#1030901).\n- Revert \u0027RDMA/core: Fix incorrect structure packing for booleans\u0027 (kabi).\n- rtnetlink: allow to register ops without ops-\u003esetup set (bsc#1021374).\n- s390/zcrypt: Introduce CEX6 toleration (FATE#321783, LTC#147506, bsc#1019514).\n- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419).\n- scsi_error: count medium access timeout only once per EH run (bsc#993832, bsc#1032345).\n- scsi: libiscsi: add lock around task lists to fix list corruption regression (bsc#1034700).\n- scsi: storvsc: fix SRB_STATUS_ABORTED handling\n- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).\n- svcrpc: fix gss-proxy NULL dereference in some error cases (bsc#1024309).\n- taint/module: Clean up global and module taint flags handling\n- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).\n- thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).\n- thp: reduce indentation level in change_huge_pmd() (bnc#1027974).\n- treewide: fix \u0027distingush\u0027 typo (bsc#1020795).\n- tree-wide: use reinit_completion instead of INIT_COMPLETION (bsc#1020795).\n- usb: dwc3: gadget: Fix incorrect DEPCMD and DGCMD status macros (bsc#1035699).\n- usb: host: xhci: print correct command ring address (bnc#1035699).\n- USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).\n- vfs: Do not exchange \u0027short\u0027 filenames unconditionally (bsc#1012985).\n- vfs: split generic splice code from i_mutex locking (bsc#1024788).\n- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).\n- VSOCK: Detach QP check should filter out non matching QPs (bsc#1036752).\n- vxlan: cancel sock_work in vxlan_dellink() (bsc#1031567).\n- vxlan: Checksum fixes (bsc#1009682).\n- vxlan: GRO support at tunnel layer (bsc#1009682).\n- xen-blkfront: correct maximum segment accounting (bsc#1018263).\n- xen-blkfront: do not call talk_to_blkback when already connected to blkback.\n- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.\n- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).\n- xfs: do not allow di_size with high bit set (bsc#1024234).\n- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).\n- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).\n- xfs: fix broken multi-fsb buffer logging (bsc#1024081).\n- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).\n- xfs: Fix lock ordering in splice write (bsc#1024788).\n- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).\n- xfs: Make xfs_icdinode-\u003edi_dmstate atomic_t (bsc#1024788).\n- xfs: pass total block res. as total xfs_bmapi_write() parameter (bsc#1029470).\n- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).\n- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP1-2017-831,SUSE-SLE-Live-Patching-12-2017-831,SUSE-SLE-Module-Public-Cloud-12-2017-831,SUSE-SLE-SDK-12-SP1-2017-831,SUSE-SLE-SERVER-12-SP1-2017-831,SUSE-SLE-WE-12-SP1-2017-831",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1360-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:1360-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171360-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:1360-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html"
},
{
"category": "self",
"summary": "SUSE Bug 1003077",
"url": "https://bugzilla.suse.com/1003077"
},
{
"category": "self",
"summary": "SUSE Bug 1008842",
"url": "https://bugzilla.suse.com/1008842"
},
{
"category": "self",
"summary": "SUSE Bug 1009682",
"url": "https://bugzilla.suse.com/1009682"
},
{
"category": "self",
"summary": "SUSE Bug 1012620",
"url": "https://bugzilla.suse.com/1012620"
},
{
"category": "self",
"summary": "SUSE Bug 1012985",
"url": "https://bugzilla.suse.com/1012985"
},
{
"category": "self",
"summary": "SUSE Bug 1015703",
"url": "https://bugzilla.suse.com/1015703"
},
{
"category": "self",
"summary": "SUSE Bug 1015787",
"url": "https://bugzilla.suse.com/1015787"
},
{
"category": "self",
"summary": "SUSE Bug 1015821",
"url": "https://bugzilla.suse.com/1015821"
},
{
"category": "self",
"summary": "SUSE Bug 1017512",
"url": "https://bugzilla.suse.com/1017512"
},
{
"category": "self",
"summary": "SUSE Bug 1018100",
"url": "https://bugzilla.suse.com/1018100"
},
{
"category": "self",
"summary": "SUSE Bug 1018263",
"url": "https://bugzilla.suse.com/1018263"
},
{
"category": "self",
"summary": "SUSE Bug 1018419",
"url": "https://bugzilla.suse.com/1018419"
},
{
"category": "self",
"summary": "SUSE Bug 1018446",
"url": "https://bugzilla.suse.com/1018446"
},
{
"category": "self",
"summary": "SUSE Bug 1019168",
"url": "https://bugzilla.suse.com/1019168"
},
{
"category": "self",
"summary": "SUSE Bug 1019514",
"url": "https://bugzilla.suse.com/1019514"
},
{
"category": "self",
"summary": "SUSE Bug 1020048",
"url": "https://bugzilla.suse.com/1020048"
},
{
"category": "self",
"summary": "SUSE Bug 1020795",
"url": "https://bugzilla.suse.com/1020795"
},
{
"category": "self",
"summary": "SUSE Bug 1021256",
"url": "https://bugzilla.suse.com/1021256"
},
{
"category": "self",
"summary": "SUSE Bug 1021374",
"url": "https://bugzilla.suse.com/1021374"
},
{
"category": "self",
"summary": "SUSE Bug 1021762",
"url": "https://bugzilla.suse.com/1021762"
},
{
"category": "self",
"summary": "SUSE Bug 1021913",
"url": "https://bugzilla.suse.com/1021913"
},
{
"category": "self",
"summary": "SUSE Bug 1022559",
"url": "https://bugzilla.suse.com/1022559"
},
{
"category": "self",
"summary": "SUSE Bug 1022971",
"url": "https://bugzilla.suse.com/1022971"
},
{
"category": "self",
"summary": "SUSE Bug 1023164",
"url": "https://bugzilla.suse.com/1023164"
},
{
"category": "self",
"summary": "SUSE Bug 1023207",
"url": "https://bugzilla.suse.com/1023207"
},
{
"category": "self",
"summary": "SUSE Bug 1023377",
"url": "https://bugzilla.suse.com/1023377"
},
{
"category": "self",
"summary": "SUSE Bug 1023762",
"url": "https://bugzilla.suse.com/1023762"
},
{
"category": "self",
"summary": "SUSE Bug 1023824",
"url": "https://bugzilla.suse.com/1023824"
},
{
"category": "self",
"summary": "SUSE Bug 1023888",
"url": "https://bugzilla.suse.com/1023888"
},
{
"category": "self",
"summary": "SUSE Bug 1023992",
"url": "https://bugzilla.suse.com/1023992"
},
{
"category": "self",
"summary": "SUSE Bug 1024081",
"url": "https://bugzilla.suse.com/1024081"
},
{
"category": "self",
"summary": "SUSE Bug 1024234",
"url": "https://bugzilla.suse.com/1024234"
},
{
"category": "self",
"summary": "SUSE Bug 1024309",
"url": "https://bugzilla.suse.com/1024309"
},
{
"category": "self",
"summary": "SUSE Bug 1024508",
"url": "https://bugzilla.suse.com/1024508"
},
{
"category": "self",
"summary": "SUSE Bug 1024788",
"url": "https://bugzilla.suse.com/1024788"
},
{
"category": "self",
"summary": "SUSE Bug 1025039",
"url": "https://bugzilla.suse.com/1025039"
},
{
"category": "self",
"summary": "SUSE Bug 1025235",
"url": "https://bugzilla.suse.com/1025235"
},
{
"category": "self",
"summary": "SUSE Bug 1025354",
"url": "https://bugzilla.suse.com/1025354"
},
{
"category": "self",
"summary": "SUSE Bug 1025802",
"url": "https://bugzilla.suse.com/1025802"
},
{
"category": "self",
"summary": "SUSE Bug 1026024",
"url": "https://bugzilla.suse.com/1026024"
},
{
"category": "self",
"summary": "SUSE Bug 1026722",
"url": "https://bugzilla.suse.com/1026722"
},
{
"category": "self",
"summary": "SUSE Bug 1026914",
"url": "https://bugzilla.suse.com/1026914"
},
{
"category": "self",
"summary": "SUSE Bug 1027066",
"url": "https://bugzilla.suse.com/1027066"
},
{
"category": "self",
"summary": "SUSE Bug 1027178",
"url": "https://bugzilla.suse.com/1027178"
},
{
"category": "self",
"summary": "SUSE Bug 1027189",
"url": "https://bugzilla.suse.com/1027189"
},
{
"category": "self",
"summary": "SUSE Bug 1027190",
"url": "https://bugzilla.suse.com/1027190"
},
{
"category": "self",
"summary": "SUSE Bug 1027974",
"url": "https://bugzilla.suse.com/1027974"
},
{
"category": "self",
"summary": "SUSE Bug 1028041",
"url": "https://bugzilla.suse.com/1028041"
},
{
"category": "self",
"summary": "SUSE Bug 1028415",
"url": "https://bugzilla.suse.com/1028415"
},
{
"category": "self",
"summary": "SUSE Bug 1028595",
"url": "https://bugzilla.suse.com/1028595"
},
{
"category": "self",
"summary": "SUSE Bug 1028648",
"url": "https://bugzilla.suse.com/1028648"
},
{
"category": "self",
"summary": "SUSE Bug 1028895",
"url": "https://bugzilla.suse.com/1028895"
},
{
"category": "self",
"summary": "SUSE Bug 1029470",
"url": "https://bugzilla.suse.com/1029470"
},
{
"category": "self",
"summary": "SUSE Bug 1029850",
"url": "https://bugzilla.suse.com/1029850"
},
{
"category": "self",
"summary": "SUSE Bug 1029986",
"url": "https://bugzilla.suse.com/1029986"
},
{
"category": "self",
"summary": "SUSE Bug 1030118",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "self",
"summary": "SUSE Bug 1030213",
"url": "https://bugzilla.suse.com/1030213"
},
{
"category": "self",
"summary": "SUSE Bug 1030593",
"url": "https://bugzilla.suse.com/1030593"
},
{
"category": "self",
"summary": "SUSE Bug 1030901",
"url": "https://bugzilla.suse.com/1030901"
},
{
"category": "self",
"summary": "SUSE Bug 1031003",
"url": "https://bugzilla.suse.com/1031003"
},
{
"category": "self",
"summary": "SUSE Bug 1031052",
"url": "https://bugzilla.suse.com/1031052"
},
{
"category": "self",
"summary": "SUSE Bug 1031080",
"url": "https://bugzilla.suse.com/1031080"
},
{
"category": "self",
"summary": "SUSE Bug 1031440",
"url": "https://bugzilla.suse.com/1031440"
},
{
"category": "self",
"summary": "SUSE Bug 1031567",
"url": "https://bugzilla.suse.com/1031567"
},
{
"category": "self",
"summary": "SUSE Bug 1031579",
"url": "https://bugzilla.suse.com/1031579"
},
{
"category": "self",
"summary": "SUSE Bug 1031662",
"url": "https://bugzilla.suse.com/1031662"
},
{
"category": "self",
"summary": "SUSE Bug 1031842",
"url": "https://bugzilla.suse.com/1031842"
},
{
"category": "self",
"summary": "SUSE Bug 1032125",
"url": "https://bugzilla.suse.com/1032125"
},
{
"category": "self",
"summary": "SUSE Bug 1032141",
"url": "https://bugzilla.suse.com/1032141"
},
{
"category": "self",
"summary": "SUSE Bug 1032344",
"url": "https://bugzilla.suse.com/1032344"
},
{
"category": "self",
"summary": "SUSE Bug 1032345",
"url": "https://bugzilla.suse.com/1032345"
},
{
"category": "self",
"summary": "SUSE Bug 1033336",
"url": "https://bugzilla.suse.com/1033336"
},
{
"category": "self",
"summary": "SUSE Bug 1034670",
"url": "https://bugzilla.suse.com/1034670"
},
{
"category": "self",
"summary": "SUSE Bug 103470",
"url": "https://bugzilla.suse.com/103470"
},
{
"category": "self",
"summary": "SUSE Bug 1034700",
"url": "https://bugzilla.suse.com/1034700"
},
{
"category": "self",
"summary": "SUSE Bug 1035576",
"url": "https://bugzilla.suse.com/1035576"
},
{
"category": "self",
"summary": "SUSE Bug 1035699",
"url": "https://bugzilla.suse.com/1035699"
},
{
"category": "self",
"summary": "SUSE Bug 1035738",
"url": "https://bugzilla.suse.com/1035738"
},
{
"category": "self",
"summary": "SUSE Bug 1035877",
"url": "https://bugzilla.suse.com/1035877"
},
{
"category": "self",
"summary": "SUSE Bug 1036752",
"url": "https://bugzilla.suse.com/1036752"
},
{
"category": "self",
"summary": "SUSE Bug 1038261",
"url": "https://bugzilla.suse.com/1038261"
},
{
"category": "self",
"summary": "SUSE Bug 799133",
"url": "https://bugzilla.suse.com/799133"
},
{
"category": "self",
"summary": "SUSE Bug 857926",
"url": "https://bugzilla.suse.com/857926"
},
{
"category": "self",
"summary": "SUSE Bug 914939",
"url": "https://bugzilla.suse.com/914939"
},
{
"category": "self",
"summary": "SUSE Bug 917630",
"url": "https://bugzilla.suse.com/917630"
},
{
"category": "self",
"summary": "SUSE Bug 922853",
"url": "https://bugzilla.suse.com/922853"
},
{
"category": "self",
"summary": "SUSE Bug 930399",
"url": "https://bugzilla.suse.com/930399"
},
{
"category": "self",
"summary": "SUSE Bug 931620",
"url": "https://bugzilla.suse.com/931620"
},
{
"category": "self",
"summary": "SUSE Bug 937444",
"url": "https://bugzilla.suse.com/937444"
},
{
"category": "self",
"summary": "SUSE Bug 940946",
"url": "https://bugzilla.suse.com/940946"
},
{
"category": "self",
"summary": "SUSE Bug 954763",
"url": "https://bugzilla.suse.com/954763"
},
{
"category": "self",
"summary": "SUSE Bug 968697",
"url": "https://bugzilla.suse.com/968697"
},
{
"category": "self",
"summary": "SUSE Bug 970083",
"url": "https://bugzilla.suse.com/970083"
},
{
"category": "self",
"summary": "SUSE Bug 971933",
"url": "https://bugzilla.suse.com/971933"
},
{
"category": "self",
"summary": "SUSE Bug 979215",
"url": "https://bugzilla.suse.com/979215"
},
{
"category": "self",
"summary": "SUSE Bug 982783",
"url": "https://bugzilla.suse.com/982783"
},
{
"category": "self",
"summary": "SUSE Bug 983212",
"url": "https://bugzilla.suse.com/983212"
},
{
"category": "self",
"summary": "SUSE Bug 984530",
"url": "https://bugzilla.suse.com/984530"
},
{
"category": "self",
"summary": "SUSE Bug 985561",
"url": "https://bugzilla.suse.com/985561"
},
{
"category": "self",
"summary": "SUSE Bug 988065",
"url": "https://bugzilla.suse.com/988065"
},
{
"category": "self",
"summary": "SUSE Bug 989056",
"url": "https://bugzilla.suse.com/989056"
},
{
"category": "self",
"summary": "SUSE Bug 993832",
"url": "https://bugzilla.suse.com/993832"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1350 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1350/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10044 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10044/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10200 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10208 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2117 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3070 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5243 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7117 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9191 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9588 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9604 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2647 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2671 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5669 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5669/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5897 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5986 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5986/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6074 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6214 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6345 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6346 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6346/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6348 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6353 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6951 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6951/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7187 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7261 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7294 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7294/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7308 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7616 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7645 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8106 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8106/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2017-05-19T12:12:38Z",
"generator": {
"date": "2017-05-19T12:12:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:1360-1",
"initial_release_date": "2017-05-19T12:12:38Z",
"revision_history": [
{
"date": "2017-05-19T12:12:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.74-60.64.40.1.noarch",
"product": {
"name": "kernel-devel-3.12.74-60.64.40.1.noarch",
"product_id": "kernel-devel-3.12.74-60.64.40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.74-60.64.40.1.noarch",
"product": {
"name": "kernel-macros-3.12.74-60.64.40.1.noarch",
"product_id": "kernel-macros-3.12.74-60.64.40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.74-60.64.40.1.noarch",
"product": {
"name": "kernel-source-3.12.74-60.64.40.1.noarch",
"product_id": "kernel-source-3.12.74-60.64.40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-3.12.74-60.64.40.4.noarch",
"product": {
"name": "kernel-docs-3.12.74-60.64.40.4.noarch",
"product_id": "kernel-docs-3.12.74-60.64.40.4.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"product_id": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.40.1.ppc64le",
"product": {
"name": "kernel-default-3.12.74-60.64.40.1.ppc64le",
"product_id": "kernel-default-3.12.74-60.64.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"product_id": "kernel-default-base-3.12.74-60.64.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"product_id": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.40.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.74-60.64.40.1.ppc64le",
"product_id": "kernel-syms-3.12.74-60.64.40.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.40.1.s390x",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.40.1.s390x",
"product_id": "kernel-obs-build-3.12.74-60.64.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.40.1.s390x",
"product": {
"name": "kernel-default-3.12.74-60.64.40.1.s390x",
"product_id": "kernel-default-3.12.74-60.64.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.40.1.s390x",
"product": {
"name": "kernel-default-base-3.12.74-60.64.40.1.s390x",
"product_id": "kernel-default-base-3.12.74-60.64.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.40.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.40.1.s390x",
"product_id": "kernel-default-devel-3.12.74-60.64.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.74-60.64.40.1.s390x",
"product": {
"name": "kernel-default-man-3.12.74-60.64.40.1.s390x",
"product_id": "kernel-default-man-3.12.74-60.64.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.40.1.s390x",
"product": {
"name": "kernel-syms-3.12.74-60.64.40.1.s390x",
"product_id": "kernel-syms-3.12.74-60.64.40.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-default-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-default-3.12.74-60.64.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-default-devel-3.12.74-60.64.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-default-extra-3.12.74-60.64.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-syms-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-syms-3.12.74-60.64.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-xen-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-xen-3.12.74-60.64.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-ec2-3.12.74-60.64.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-obs-build-3.12.74-60.64.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-default-base-3.12.74-60.64.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"product_id": "kernel-xen-base-3.12.74-60.64.40.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.12.74-60.64.40.4.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch"
},
"product_reference": "kernel-docs-3.12.74-60.64.40.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le"
},
"product_reference": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x"
},
"product_reference": "kernel-obs-build-3.12.74-60.64.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le"
},
"product_reference": "kernel-default-3.12.74-60.64.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x"
},
"product_reference": "kernel-default-3.12.74-60.64.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x"
},
"product_reference": "kernel-default-base-3.12.74-60.64.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x"
},
"product_reference": "kernel-default-man-3.12.74-60.64.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.74-60.64.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x"
},
"product_reference": "kernel-syms-3.12.74-60.64.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le"
},
"product_reference": "kernel-default-3.12.74-60.64.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x"
},
"product_reference": "kernel-default-3.12.74-60.64.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x"
},
"product_reference": "kernel-default-base-3.12.74-60.64.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x"
},
"product_reference": "kernel-default-man-3.12.74-60.64.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.74-60.64.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x"
},
"product_reference": "kernel-syms-3.12.74-60.64.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
},
"product_reference": "kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-1350",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1350"
}
],
"notes": [
{
"category": "general",
"text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1350",
"url": "https://www.suse.com/security/cve/CVE-2015-1350"
},
{
"category": "external",
"summary": "SUSE Bug 1052256 for CVE-2015-1350",
"url": "https://bugzilla.suse.com/1052256"
},
{
"category": "external",
"summary": "SUSE Bug 914939 for CVE-2015-1350",
"url": "https://bugzilla.suse.com/914939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2015-1350"
},
{
"cve": "CVE-2016-10044",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10044"
}
],
"notes": [
{
"category": "general",
"text": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10044",
"url": "https://www.suse.com/security/cve/CVE-2016-10044"
},
{
"category": "external",
"summary": "SUSE Bug 1023992 for CVE-2016-10044",
"url": "https://bugzilla.suse.com/1023992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "low"
}
],
"title": "CVE-2016-10044"
},
{
"cve": "CVE-2016-10200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10200"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10200",
"url": "https://www.suse.com/security/cve/CVE-2016-10200"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2016-10200",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1028415 for CVE-2016-10200",
"url": "https://bugzilla.suse.com/1028415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "low"
}
],
"title": "CVE-2016-10200"
},
{
"cve": "CVE-2016-10208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10208"
}
],
"notes": [
{
"category": "general",
"text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10208",
"url": "https://www.suse.com/security/cve/CVE-2016-10208"
},
{
"category": "external",
"summary": "SUSE Bug 1023377 for CVE-2016-10208",
"url": "https://bugzilla.suse.com/1023377"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2016-10208",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "important"
}
],
"title": "CVE-2016-10208"
},
{
"cve": "CVE-2016-2117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2117"
}
],
"notes": [
{
"category": "general",
"text": "The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2117",
"url": "https://www.suse.com/security/cve/CVE-2016-2117"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2016-2117",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 968697 for CVE-2016-2117",
"url": "https://bugzilla.suse.com/968697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "important"
}
],
"title": "CVE-2016-2117"
},
{
"cve": "CVE-2016-3070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3070"
}
],
"notes": [
{
"category": "general",
"text": "The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3070",
"url": "https://www.suse.com/security/cve/CVE-2016-3070"
},
{
"category": "external",
"summary": "SUSE Bug 979215 for CVE-2016-3070",
"url": "https://bugzilla.suse.com/979215"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "low"
}
],
"title": "CVE-2016-3070"
},
{
"cve": "CVE-2016-5243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5243"
}
],
"notes": [
{
"category": "general",
"text": "The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5243",
"url": "https://www.suse.com/security/cve/CVE-2016-5243"
},
{
"category": "external",
"summary": "SUSE Bug 983212 for CVE-2016-5243",
"url": "https://bugzilla.suse.com/983212"
},
{
"category": "external",
"summary": "SUSE Bug 986225 for CVE-2016-5243",
"url": "https://bugzilla.suse.com/986225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "low"
}
],
"title": "CVE-2016-5243"
},
{
"cve": "CVE-2016-7117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7117"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7117",
"url": "https://www.suse.com/security/cve/CVE-2016-7117"
},
{
"category": "external",
"summary": "SUSE Bug 1003077 for CVE-2016-7117",
"url": "https://bugzilla.suse.com/1003077"
},
{
"category": "external",
"summary": "SUSE Bug 1003253 for CVE-2016-7117",
"url": "https://bugzilla.suse.com/1003253"
},
{
"category": "external",
"summary": "SUSE Bug 1057478 for CVE-2016-7117",
"url": "https://bugzilla.suse.com/1057478"
},
{
"category": "external",
"summary": "SUSE Bug 1071943 for CVE-2016-7117",
"url": "https://bugzilla.suse.com/1071943"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-7117"
},
{
"cve": "CVE-2016-9191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9191"
}
],
"notes": [
{
"category": "general",
"text": "The cgroup offline implementation in the Linux kernel through 4.8.11 mishandles certain drain operations, which allows local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application, as demonstrated by trinity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9191",
"url": "https://www.suse.com/security/cve/CVE-2016-9191"
},
{
"category": "external",
"summary": "SUSE Bug 1008842 for CVE-2016-9191",
"url": "https://bugzilla.suse.com/1008842"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2016-9191",
"url": "https://bugzilla.suse.com/1027179"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-9191"
},
{
"cve": "CVE-2016-9588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9588"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9588",
"url": "https://www.suse.com/security/cve/CVE-2016-9588"
},
{
"category": "external",
"summary": "SUSE Bug 1015703 for CVE-2016-9588",
"url": "https://bugzilla.suse.com/1015703"
},
{
"category": "external",
"summary": "SUSE Bug 1017512 for CVE-2016-9588",
"url": "https://bugzilla.suse.com/1017512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-9588"
},
{
"cve": "CVE-2016-9604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9604"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as \u0027.dns_resolver\u0027 in RHEL-7 or \u0027.builtin_trusted_keys\u0027 upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9604",
"url": "https://www.suse.com/security/cve/CVE-2016-9604"
},
{
"category": "external",
"summary": "SUSE Bug 1035576 for CVE-2016-9604",
"url": "https://bugzilla.suse.com/1035576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2016-9604"
},
{
"cve": "CVE-2017-2647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2647"
}
],
"notes": [
{
"category": "general",
"text": "The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2647",
"url": "https://www.suse.com/security/cve/CVE-2017-2647"
},
{
"category": "external",
"summary": "SUSE Bug 1030593 for CVE-2017-2647",
"url": "https://bugzilla.suse.com/1030593"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-2647",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "important"
}
],
"title": "CVE-2017-2647"
},
{
"cve": "CVE-2017-2671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2671"
}
],
"notes": [
{
"category": "general",
"text": "The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2671",
"url": "https://www.suse.com/security/cve/CVE-2017-2671"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-2671",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1031003 for CVE-2017-2671",
"url": "https://bugzilla.suse.com/1031003"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-2671",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "important"
}
],
"title": "CVE-2017-2671"
},
{
"cve": "CVE-2017-5669",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5669"
}
],
"notes": [
{
"category": "general",
"text": "The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5669",
"url": "https://www.suse.com/security/cve/CVE-2017-5669"
},
{
"category": "external",
"summary": "SUSE Bug 1026914 for CVE-2017-5669",
"url": "https://bugzilla.suse.com/1026914"
},
{
"category": "external",
"summary": "SUSE Bug 1102390 for CVE-2017-5669",
"url": "https://bugzilla.suse.com/1102390"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-5669",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-5669"
},
{
"cve": "CVE-2017-5897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5897"
}
],
"notes": [
{
"category": "general",
"text": "The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5897",
"url": "https://www.suse.com/security/cve/CVE-2017-5897"
},
{
"category": "external",
"summary": "SUSE Bug 1023762 for CVE-2017-5897",
"url": "https://bugzilla.suse.com/1023762"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-5897",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-5897"
},
{
"cve": "CVE-2017-5986",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5986"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5986",
"url": "https://www.suse.com/security/cve/CVE-2017-5986"
},
{
"category": "external",
"summary": "SUSE Bug 1025235 for CVE-2017-5986",
"url": "https://bugzilla.suse.com/1025235"
},
{
"category": "external",
"summary": "SUSE Bug 1027066 for CVE-2017-5986",
"url": "https://bugzilla.suse.com/1027066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-5986"
},
{
"cve": "CVE-2017-6074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6074"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6074",
"url": "https://www.suse.com/security/cve/CVE-2017-6074"
},
{
"category": "external",
"summary": "SUSE Bug 1026024 for CVE-2017-6074",
"url": "https://bugzilla.suse.com/1026024"
},
{
"category": "external",
"summary": "SUSE Bug 1072204 for CVE-2017-6074",
"url": "https://bugzilla.suse.com/1072204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "important"
}
],
"title": "CVE-2017-6074"
},
{
"cve": "CVE-2017-6214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6214"
}
],
"notes": [
{
"category": "general",
"text": "The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6214",
"url": "https://www.suse.com/security/cve/CVE-2017-6214"
},
{
"category": "external",
"summary": "SUSE Bug 1026722 for CVE-2017-6214",
"url": "https://bugzilla.suse.com/1026722"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-6214",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-6214",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-6214"
},
{
"cve": "CVE-2017-6345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6345"
}
],
"notes": [
{
"category": "general",
"text": "The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6345",
"url": "https://www.suse.com/security/cve/CVE-2017-6345"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-6345",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1027190 for CVE-2017-6345",
"url": "https://bugzilla.suse.com/1027190"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-6345",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-6345"
},
{
"cve": "CVE-2017-6346",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6346"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6346",
"url": "https://www.suse.com/security/cve/CVE-2017-6346"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-6346",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1027189 for CVE-2017-6346",
"url": "https://bugzilla.suse.com/1027189"
},
{
"category": "external",
"summary": "SUSE Bug 1064388 for CVE-2017-6346",
"url": "https://bugzilla.suse.com/1064388"
},
{
"category": "external",
"summary": "SUSE Bug 1064392 for CVE-2017-6346",
"url": "https://bugzilla.suse.com/1064392"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "low"
}
],
"title": "CVE-2017-6346"
},
{
"cve": "CVE-2017-6348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6348"
}
],
"notes": [
{
"category": "general",
"text": "The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6348",
"url": "https://www.suse.com/security/cve/CVE-2017-6348"
},
{
"category": "external",
"summary": "SUSE Bug 1027178 for CVE-2017-6348",
"url": "https://bugzilla.suse.com/1027178"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-6348",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-6348"
},
{
"cve": "CVE-2017-6353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6353"
}
],
"notes": [
{
"category": "general",
"text": "net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6353",
"url": "https://www.suse.com/security/cve/CVE-2017-6353"
},
{
"category": "external",
"summary": "SUSE Bug 1025235 for CVE-2017-6353",
"url": "https://bugzilla.suse.com/1025235"
},
{
"category": "external",
"summary": "SUSE Bug 1027066 for CVE-2017-6353",
"url": "https://bugzilla.suse.com/1027066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-6353"
},
{
"cve": "CVE-2017-6951",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6951"
}
],
"notes": [
{
"category": "general",
"text": "The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the \"dead\" type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6951",
"url": "https://www.suse.com/security/cve/CVE-2017-6951"
},
{
"category": "external",
"summary": "SUSE Bug 1029850 for CVE-2017-6951",
"url": "https://bugzilla.suse.com/1029850"
},
{
"category": "external",
"summary": "SUSE Bug 1030593 for CVE-2017-6951",
"url": "https://bugzilla.suse.com/1030593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-6951"
},
{
"cve": "CVE-2017-7187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7187"
}
],
"notes": [
{
"category": "general",
"text": "The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7187",
"url": "https://www.suse.com/security/cve/CVE-2017-7187"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-7187",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1030213 for CVE-2017-7187",
"url": "https://bugzilla.suse.com/1030213"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-7187",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-7187"
},
{
"cve": "CVE-2017-7261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7261"
}
],
"notes": [
{
"category": "general",
"text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7261",
"url": "https://www.suse.com/security/cve/CVE-2017-7261"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-7261",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1031052 for CVE-2017-7261",
"url": "https://bugzilla.suse.com/1031052"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-7261"
},
{
"cve": "CVE-2017-7294",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7294"
}
],
"notes": [
{
"category": "general",
"text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7294",
"url": "https://www.suse.com/security/cve/CVE-2017-7294"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-7294",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1031440 for CVE-2017-7294",
"url": "https://bugzilla.suse.com/1031440"
},
{
"category": "external",
"summary": "SUSE Bug 1031481 for CVE-2017-7294",
"url": "https://bugzilla.suse.com/1031481"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-7294",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-7294"
},
{
"cve": "CVE-2017-7308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7308"
}
],
"notes": [
{
"category": "general",
"text": "The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7308",
"url": "https://www.suse.com/security/cve/CVE-2017-7308"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-7308",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1031579 for CVE-2017-7308",
"url": "https://bugzilla.suse.com/1031579"
},
{
"category": "external",
"summary": "SUSE Bug 1031660 for CVE-2017-7308",
"url": "https://bugzilla.suse.com/1031660"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-7308",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2017-7308"
},
{
"cve": "CVE-2017-7616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7616"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7616",
"url": "https://www.suse.com/security/cve/CVE-2017-7616"
},
{
"category": "external",
"summary": "SUSE Bug 1033336 for CVE-2017-7616",
"url": "https://bugzilla.suse.com/1033336"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "low"
}
],
"title": "CVE-2017-7616"
},
{
"cve": "CVE-2017-7645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7645"
}
],
"notes": [
{
"category": "general",
"text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7645",
"url": "https://www.suse.com/security/cve/CVE-2017-7645"
},
{
"category": "external",
"summary": "SUSE Bug 1034670 for CVE-2017-7645",
"url": "https://bugzilla.suse.com/1034670"
},
{
"category": "external",
"summary": "SUSE Bug 1036741 for CVE-2017-7645",
"url": "https://bugzilla.suse.com/1036741"
},
{
"category": "external",
"summary": "SUSE Bug 1046191 for CVE-2017-7645",
"url": "https://bugzilla.suse.com/1046191"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-7645",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "important"
}
],
"title": "CVE-2017-7645"
},
{
"cve": "CVE-2017-8106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8106"
}
],
"notes": [
{
"category": "general",
"text": "The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8106",
"url": "https://www.suse.com/security/cve/CVE-2017-8106"
},
{
"category": "external",
"summary": "SUSE Bug 1035877 for CVE-2017-8106",
"url": "https://bugzilla.suse.com/1035877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-19T12:12:38Z",
"details": "low"
}
],
"title": "CVE-2017-8106"
}
]
}
suse-su-2017:1247-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).\n- CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enabled scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697).\n- CVE-2016-3070: The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel improperly interacted with mm/migrate.c, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move (bnc#979215).\n- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanages the #BP and #OF exceptions, which allowed guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest (bnc#1015703).\n- CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel did not properly restrict execute access, which made it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call (bnc#1023992).\n- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415).\n- CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel did not properly validate meta block groups, which allowed physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image (bnc#1023377).\n- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003).\n- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914).\n- CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allowed remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access (bnc#1023762).\n- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938).\n- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bnc#1025235).\n- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024).\n- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722).\n- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190).\n- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189).\n- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178).\n- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066).\n- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).\n- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).\n- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).\n- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579).\n- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bnc#1033336).\n\nThe following non-security bugs were fixed:\n\n- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).\n- hwrng: virtio - ensure reads happen after successful probe (bsc#954763 bsc#1032344).\n- kgr/module: make a taint flag module-specific (fate#313296).\n- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).\n- l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).\n- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415).\n- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415).\n- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).\n- l2tp: lock socket before checking flags in connect() (bsc#1028415).\n- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).\n- module: move add_taint_module() to a header file (fate#313296).\n- netfilter: bridge: Fix the build when IPV6 is disabled (bsc#1027149).\n- nfs: flush out dirty data on file fput() (bsc#1021762).\n- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).\n- powerpc: Reject binutils 2.24 when building little endian (boo#1028895).\n- revert \u0027procfs: mark thread stack correctly in proc/\u003cpid\u003e/maps\u0027 (bnc#1030901).\n- taint/module: Clean up global and module taint flags handling (fate#313296).\n- usb: serial: kl5kusb105: fix line-state error handling (bsc#1021256).\n- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).\n- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Public-Cloud-12-2017-749,SUSE-SLE-SAP-12-2017-749,SUSE-SLE-SERVER-12-2017-749",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1247-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:1247-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171247-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:1247-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html"
},
{
"category": "self",
"summary": "SUSE Bug 1003077",
"url": "https://bugzilla.suse.com/1003077"
},
{
"category": "self",
"summary": "SUSE Bug 1015703",
"url": "https://bugzilla.suse.com/1015703"
},
{
"category": "self",
"summary": "SUSE Bug 1021256",
"url": "https://bugzilla.suse.com/1021256"
},
{
"category": "self",
"summary": "SUSE Bug 1021762",
"url": "https://bugzilla.suse.com/1021762"
},
{
"category": "self",
"summary": "SUSE Bug 1023377",
"url": "https://bugzilla.suse.com/1023377"
},
{
"category": "self",
"summary": "SUSE Bug 1023762",
"url": "https://bugzilla.suse.com/1023762"
},
{
"category": "self",
"summary": "SUSE Bug 1023992",
"url": "https://bugzilla.suse.com/1023992"
},
{
"category": "self",
"summary": "SUSE Bug 1024938",
"url": "https://bugzilla.suse.com/1024938"
},
{
"category": "self",
"summary": "SUSE Bug 1025235",
"url": "https://bugzilla.suse.com/1025235"
},
{
"category": "self",
"summary": "SUSE Bug 1026024",
"url": "https://bugzilla.suse.com/1026024"
},
{
"category": "self",
"summary": "SUSE Bug 1026722",
"url": "https://bugzilla.suse.com/1026722"
},
{
"category": "self",
"summary": "SUSE Bug 1026914",
"url": "https://bugzilla.suse.com/1026914"
},
{
"category": "self",
"summary": "SUSE Bug 1027066",
"url": "https://bugzilla.suse.com/1027066"
},
{
"category": "self",
"summary": "SUSE Bug 1027149",
"url": "https://bugzilla.suse.com/1027149"
},
{
"category": "self",
"summary": "SUSE Bug 1027178",
"url": "https://bugzilla.suse.com/1027178"
},
{
"category": "self",
"summary": "SUSE Bug 1027189",
"url": "https://bugzilla.suse.com/1027189"
},
{
"category": "self",
"summary": "SUSE Bug 1027190",
"url": "https://bugzilla.suse.com/1027190"
},
{
"category": "self",
"summary": "SUSE Bug 1028415",
"url": "https://bugzilla.suse.com/1028415"
},
{
"category": "self",
"summary": "SUSE Bug 1028895",
"url": "https://bugzilla.suse.com/1028895"
},
{
"category": "self",
"summary": "SUSE Bug 1029986",
"url": "https://bugzilla.suse.com/1029986"
},
{
"category": "self",
"summary": "SUSE Bug 1030118",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "self",
"summary": "SUSE Bug 1030213",
"url": "https://bugzilla.suse.com/1030213"
},
{
"category": "self",
"summary": "SUSE Bug 1030901",
"url": "https://bugzilla.suse.com/1030901"
},
{
"category": "self",
"summary": "SUSE Bug 1031003",
"url": "https://bugzilla.suse.com/1031003"
},
{
"category": "self",
"summary": "SUSE Bug 1031052",
"url": "https://bugzilla.suse.com/1031052"
},
{
"category": "self",
"summary": "SUSE Bug 1031440",
"url": "https://bugzilla.suse.com/1031440"
},
{
"category": "self",
"summary": "SUSE Bug 1031579",
"url": "https://bugzilla.suse.com/1031579"
},
{
"category": "self",
"summary": "SUSE Bug 1032344",
"url": "https://bugzilla.suse.com/1032344"
},
{
"category": "self",
"summary": "SUSE Bug 1033336",
"url": "https://bugzilla.suse.com/1033336"
},
{
"category": "self",
"summary": "SUSE Bug 914939",
"url": "https://bugzilla.suse.com/914939"
},
{
"category": "self",
"summary": "SUSE Bug 954763",
"url": "https://bugzilla.suse.com/954763"
},
{
"category": "self",
"summary": "SUSE Bug 968697",
"url": "https://bugzilla.suse.com/968697"
},
{
"category": "self",
"summary": "SUSE Bug 979215",
"url": "https://bugzilla.suse.com/979215"
},
{
"category": "self",
"summary": "SUSE Bug 983212",
"url": "https://bugzilla.suse.com/983212"
},
{
"category": "self",
"summary": "SUSE Bug 989056",
"url": "https://bugzilla.suse.com/989056"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1350 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1350/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10044 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10044/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10200 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10208 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2117 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3070 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5243 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7117 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9588 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2671 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5669 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5669/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5897 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5970 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5970/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5986 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5986/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6074 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6214 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6345 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6346 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6346/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6348 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6353 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7187 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7261 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7294 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7294/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7308 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7616 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7616/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2017-05-11T14:24:14Z",
"generator": {
"date": "2017-05-11T14:24:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:1247-1",
"initial_release_date": "2017-05-11T14:24:14Z",
"revision_history": [
{
"date": "2017-05-11T14:24:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.61-52.72.1.noarch",
"product": {
"name": "kernel-devel-3.12.61-52.72.1.noarch",
"product_id": "kernel-devel-3.12.61-52.72.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.61-52.72.1.noarch",
"product": {
"name": "kernel-macros-3.12.61-52.72.1.noarch",
"product_id": "kernel-macros-3.12.61-52.72.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.61-52.72.1.noarch",
"product": {
"name": "kernel-source-3.12.61-52.72.1.noarch",
"product_id": "kernel-source-3.12.61-52.72.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.72.1.ppc64le",
"product": {
"name": "kernel-default-3.12.61-52.72.1.ppc64le",
"product_id": "kernel-default-3.12.61-52.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.72.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.61-52.72.1.ppc64le",
"product_id": "kernel-default-base-3.12.61-52.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.72.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.61-52.72.1.ppc64le",
"product_id": "kernel-default-devel-3.12.61-52.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.72.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.61-52.72.1.ppc64le",
"product_id": "kernel-syms-3.12.61-52.72.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.72.1.s390x",
"product": {
"name": "kernel-default-3.12.61-52.72.1.s390x",
"product_id": "kernel-default-3.12.61-52.72.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.72.1.s390x",
"product": {
"name": "kernel-default-base-3.12.61-52.72.1.s390x",
"product_id": "kernel-default-base-3.12.61-52.72.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.72.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.61-52.72.1.s390x",
"product_id": "kernel-default-devel-3.12.61-52.72.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.61-52.72.1.s390x",
"product": {
"name": "kernel-default-man-3.12.61-52.72.1.s390x",
"product_id": "kernel-default-man-3.12.61-52.72.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.72.1.s390x",
"product": {
"name": "kernel-syms-3.12.61-52.72.1.s390x",
"product_id": "kernel-syms-3.12.61-52.72.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-ec2-3.12.61-52.72.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.61-52.72.1.x86_64",
"product_id": "kernel-ec2-3.12.61-52.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.61-52.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.61-52.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.72.1.x86_64",
"product": {
"name": "kernel-default-3.12.61-52.72.1.x86_64",
"product_id": "kernel-default-3.12.61-52.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.72.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.61-52.72.1.x86_64",
"product_id": "kernel-default-base-3.12.61-52.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.72.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.61-52.72.1.x86_64",
"product_id": "kernel-default-devel-3.12.61-52.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.72.1.x86_64",
"product": {
"name": "kernel-syms-3.12.61-52.72.1.x86_64",
"product_id": "kernel-syms-3.12.61-52.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.61-52.72.1.x86_64",
"product": {
"name": "kernel-xen-3.12.61-52.72.1.x86_64",
"product_id": "kernel-xen-3.12.61-52.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.61-52.72.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.61-52.72.1.x86_64",
"product_id": "kernel-xen-base-3.12.61-52.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.61-52.72.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.61-52.72.1.x86_64",
"product_id": "kernel-xen-devel-3.12.61-52.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-default-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch"
},
"product_reference": "kernel-devel-3.12.61-52.72.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch"
},
"product_reference": "kernel-macros-3.12.61-52.72.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch"
},
"product_reference": "kernel-source-3.12.61-52.72.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-syms-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-xen-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.72.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le"
},
"product_reference": "kernel-default-3.12.61-52.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.72.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x"
},
"product_reference": "kernel-default-3.12.61-52.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-default-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.72.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.61-52.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.72.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x"
},
"product_reference": "kernel-default-base-3.12.61-52.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.72.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.61-52.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.72.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.61-52.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.61-52.72.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x"
},
"product_reference": "kernel-default-man-3.12.61-52.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch"
},
"product_reference": "kernel-devel-3.12.61-52.72.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch"
},
"product_reference": "kernel-macros-3.12.61-52.72.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch"
},
"product_reference": "kernel-source-3.12.61-52.72.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.72.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.61-52.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.72.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x"
},
"product_reference": "kernel-syms-3.12.61-52.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-syms-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-xen-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.61-52.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-1350",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1350"
}
],
"notes": [
{
"category": "general",
"text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1350",
"url": "https://www.suse.com/security/cve/CVE-2015-1350"
},
{
"category": "external",
"summary": "SUSE Bug 1052256 for CVE-2015-1350",
"url": "https://bugzilla.suse.com/1052256"
},
{
"category": "external",
"summary": "SUSE Bug 914939 for CVE-2015-1350",
"url": "https://bugzilla.suse.com/914939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2015-1350"
},
{
"cve": "CVE-2016-10044",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10044"
}
],
"notes": [
{
"category": "general",
"text": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10044",
"url": "https://www.suse.com/security/cve/CVE-2016-10044"
},
{
"category": "external",
"summary": "SUSE Bug 1023992 for CVE-2016-10044",
"url": "https://bugzilla.suse.com/1023992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "low"
}
],
"title": "CVE-2016-10044"
},
{
"cve": "CVE-2016-10200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10200"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10200",
"url": "https://www.suse.com/security/cve/CVE-2016-10200"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2016-10200",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1028415 for CVE-2016-10200",
"url": "https://bugzilla.suse.com/1028415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "low"
}
],
"title": "CVE-2016-10200"
},
{
"cve": "CVE-2016-10208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10208"
}
],
"notes": [
{
"category": "general",
"text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10208",
"url": "https://www.suse.com/security/cve/CVE-2016-10208"
},
{
"category": "external",
"summary": "SUSE Bug 1023377 for CVE-2016-10208",
"url": "https://bugzilla.suse.com/1023377"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2016-10208",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "important"
}
],
"title": "CVE-2016-10208"
},
{
"cve": "CVE-2016-2117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2117"
}
],
"notes": [
{
"category": "general",
"text": "The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2117",
"url": "https://www.suse.com/security/cve/CVE-2016-2117"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2016-2117",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 968697 for CVE-2016-2117",
"url": "https://bugzilla.suse.com/968697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "important"
}
],
"title": "CVE-2016-2117"
},
{
"cve": "CVE-2016-3070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3070"
}
],
"notes": [
{
"category": "general",
"text": "The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3070",
"url": "https://www.suse.com/security/cve/CVE-2016-3070"
},
{
"category": "external",
"summary": "SUSE Bug 979215 for CVE-2016-3070",
"url": "https://bugzilla.suse.com/979215"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "low"
}
],
"title": "CVE-2016-3070"
},
{
"cve": "CVE-2016-5243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5243"
}
],
"notes": [
{
"category": "general",
"text": "The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5243",
"url": "https://www.suse.com/security/cve/CVE-2016-5243"
},
{
"category": "external",
"summary": "SUSE Bug 983212 for CVE-2016-5243",
"url": "https://bugzilla.suse.com/983212"
},
{
"category": "external",
"summary": "SUSE Bug 986225 for CVE-2016-5243",
"url": "https://bugzilla.suse.com/986225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "low"
}
],
"title": "CVE-2016-5243"
},
{
"cve": "CVE-2016-7117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7117"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7117",
"url": "https://www.suse.com/security/cve/CVE-2016-7117"
},
{
"category": "external",
"summary": "SUSE Bug 1003077 for CVE-2016-7117",
"url": "https://bugzilla.suse.com/1003077"
},
{
"category": "external",
"summary": "SUSE Bug 1003253 for CVE-2016-7117",
"url": "https://bugzilla.suse.com/1003253"
},
{
"category": "external",
"summary": "SUSE Bug 1057478 for CVE-2016-7117",
"url": "https://bugzilla.suse.com/1057478"
},
{
"category": "external",
"summary": "SUSE Bug 1071943 for CVE-2016-7117",
"url": "https://bugzilla.suse.com/1071943"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2016-7117"
},
{
"cve": "CVE-2016-9588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9588"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9588",
"url": "https://www.suse.com/security/cve/CVE-2016-9588"
},
{
"category": "external",
"summary": "SUSE Bug 1015703 for CVE-2016-9588",
"url": "https://bugzilla.suse.com/1015703"
},
{
"category": "external",
"summary": "SUSE Bug 1017512 for CVE-2016-9588",
"url": "https://bugzilla.suse.com/1017512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2016-9588"
},
{
"cve": "CVE-2017-2671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2671"
}
],
"notes": [
{
"category": "general",
"text": "The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2671",
"url": "https://www.suse.com/security/cve/CVE-2017-2671"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-2671",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1031003 for CVE-2017-2671",
"url": "https://bugzilla.suse.com/1031003"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-2671",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "important"
}
],
"title": "CVE-2017-2671"
},
{
"cve": "CVE-2017-5669",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5669"
}
],
"notes": [
{
"category": "general",
"text": "The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5669",
"url": "https://www.suse.com/security/cve/CVE-2017-5669"
},
{
"category": "external",
"summary": "SUSE Bug 1026914 for CVE-2017-5669",
"url": "https://bugzilla.suse.com/1026914"
},
{
"category": "external",
"summary": "SUSE Bug 1102390 for CVE-2017-5669",
"url": "https://bugzilla.suse.com/1102390"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-5669",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2017-5669"
},
{
"cve": "CVE-2017-5897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5897"
}
],
"notes": [
{
"category": "general",
"text": "The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5897",
"url": "https://www.suse.com/security/cve/CVE-2017-5897"
},
{
"category": "external",
"summary": "SUSE Bug 1023762 for CVE-2017-5897",
"url": "https://bugzilla.suse.com/1023762"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-5897",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2017-5897"
},
{
"cve": "CVE-2017-5970",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5970"
}
],
"notes": [
{
"category": "general",
"text": "The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5970",
"url": "https://www.suse.com/security/cve/CVE-2017-5970"
},
{
"category": "external",
"summary": "SUSE Bug 1024938 for CVE-2017-5970",
"url": "https://bugzilla.suse.com/1024938"
},
{
"category": "external",
"summary": "SUSE Bug 1025013 for CVE-2017-5970",
"url": "https://bugzilla.suse.com/1025013"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-5970",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "important"
}
],
"title": "CVE-2017-5970"
},
{
"cve": "CVE-2017-5986",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5986"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5986",
"url": "https://www.suse.com/security/cve/CVE-2017-5986"
},
{
"category": "external",
"summary": "SUSE Bug 1025235 for CVE-2017-5986",
"url": "https://bugzilla.suse.com/1025235"
},
{
"category": "external",
"summary": "SUSE Bug 1027066 for CVE-2017-5986",
"url": "https://bugzilla.suse.com/1027066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2017-5986"
},
{
"cve": "CVE-2017-6074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6074"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6074",
"url": "https://www.suse.com/security/cve/CVE-2017-6074"
},
{
"category": "external",
"summary": "SUSE Bug 1026024 for CVE-2017-6074",
"url": "https://bugzilla.suse.com/1026024"
},
{
"category": "external",
"summary": "SUSE Bug 1072204 for CVE-2017-6074",
"url": "https://bugzilla.suse.com/1072204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "important"
}
],
"title": "CVE-2017-6074"
},
{
"cve": "CVE-2017-6214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6214"
}
],
"notes": [
{
"category": "general",
"text": "The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6214",
"url": "https://www.suse.com/security/cve/CVE-2017-6214"
},
{
"category": "external",
"summary": "SUSE Bug 1026722 for CVE-2017-6214",
"url": "https://bugzilla.suse.com/1026722"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-6214",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-6214",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2017-6214"
},
{
"cve": "CVE-2017-6345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6345"
}
],
"notes": [
{
"category": "general",
"text": "The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6345",
"url": "https://www.suse.com/security/cve/CVE-2017-6345"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-6345",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1027190 for CVE-2017-6345",
"url": "https://bugzilla.suse.com/1027190"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-6345",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2017-6345"
},
{
"cve": "CVE-2017-6346",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6346"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6346",
"url": "https://www.suse.com/security/cve/CVE-2017-6346"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-6346",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1027189 for CVE-2017-6346",
"url": "https://bugzilla.suse.com/1027189"
},
{
"category": "external",
"summary": "SUSE Bug 1064388 for CVE-2017-6346",
"url": "https://bugzilla.suse.com/1064388"
},
{
"category": "external",
"summary": "SUSE Bug 1064392 for CVE-2017-6346",
"url": "https://bugzilla.suse.com/1064392"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "low"
}
],
"title": "CVE-2017-6346"
},
{
"cve": "CVE-2017-6348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6348"
}
],
"notes": [
{
"category": "general",
"text": "The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6348",
"url": "https://www.suse.com/security/cve/CVE-2017-6348"
},
{
"category": "external",
"summary": "SUSE Bug 1027178 for CVE-2017-6348",
"url": "https://bugzilla.suse.com/1027178"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-6348",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2017-6348"
},
{
"cve": "CVE-2017-6353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6353"
}
],
"notes": [
{
"category": "general",
"text": "net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6353",
"url": "https://www.suse.com/security/cve/CVE-2017-6353"
},
{
"category": "external",
"summary": "SUSE Bug 1025235 for CVE-2017-6353",
"url": "https://bugzilla.suse.com/1025235"
},
{
"category": "external",
"summary": "SUSE Bug 1027066 for CVE-2017-6353",
"url": "https://bugzilla.suse.com/1027066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2017-6353"
},
{
"cve": "CVE-2017-7187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7187"
}
],
"notes": [
{
"category": "general",
"text": "The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7187",
"url": "https://www.suse.com/security/cve/CVE-2017-7187"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-7187",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1030213 for CVE-2017-7187",
"url": "https://bugzilla.suse.com/1030213"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-7187",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2017-7187"
},
{
"cve": "CVE-2017-7261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7261"
}
],
"notes": [
{
"category": "general",
"text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7261",
"url": "https://www.suse.com/security/cve/CVE-2017-7261"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-7261",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1031052 for CVE-2017-7261",
"url": "https://bugzilla.suse.com/1031052"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2017-7261"
},
{
"cve": "CVE-2017-7294",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7294"
}
],
"notes": [
{
"category": "general",
"text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7294",
"url": "https://www.suse.com/security/cve/CVE-2017-7294"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-7294",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1031440 for CVE-2017-7294",
"url": "https://bugzilla.suse.com/1031440"
},
{
"category": "external",
"summary": "SUSE Bug 1031481 for CVE-2017-7294",
"url": "https://bugzilla.suse.com/1031481"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-7294",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2017-7294"
},
{
"cve": "CVE-2017-7308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7308"
}
],
"notes": [
{
"category": "general",
"text": "The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7308",
"url": "https://www.suse.com/security/cve/CVE-2017-7308"
},
{
"category": "external",
"summary": "SUSE Bug 1027179 for CVE-2017-7308",
"url": "https://bugzilla.suse.com/1027179"
},
{
"category": "external",
"summary": "SUSE Bug 1031579 for CVE-2017-7308",
"url": "https://bugzilla.suse.com/1031579"
},
{
"category": "external",
"summary": "SUSE Bug 1031660 for CVE-2017-7308",
"url": "https://bugzilla.suse.com/1031660"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-7308",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "moderate"
}
],
"title": "CVE-2017-7308"
},
{
"cve": "CVE-2017-7616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7616"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7616",
"url": "https://www.suse.com/security/cve/CVE-2017-7616"
},
{
"category": "external",
"summary": "SUSE Bug 1033336 for CVE-2017-7616",
"url": "https://bugzilla.suse.com/1033336"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-05-11T14:24:14Z",
"details": "low"
}
],
"title": "CVE-2017-7616"
}
]
}
wid-sec-w-2024-3251
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder andere, nicht n\u00e4her bekannte Auswirkungen zu erzielen..",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3251 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3251.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3251 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3251"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47726",
"url": "https://lore.kernel.org/linux-cve-announce/2024102104-CVE-2024-47726-ae53@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47729",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47729-8985@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47730",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47730-2f1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47731",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47731-fd73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47732",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47732-f8aa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50003",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-50003-43bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47733",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47733-6591@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47734",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47734-ad75@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47735",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47735-5d51@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50004",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50004-101e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50005",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50005-3479@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50006",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50006-fe44@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50007",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50007-0253@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50008",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50008-0152@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50009",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50009-1b62@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50010",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50010-57e8@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50011",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50011-98c9@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50012",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50012-db7d@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49863",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-49863-6a74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50013",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50013-05ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50014",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50014-d684@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50015",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50015-1eb0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50016",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50016-745a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50017",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50017-f157@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50018",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-50018-65e9@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47749",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47749-c227@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47750",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47750-390b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47751",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47751-7a96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47752",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47752-1b11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49864",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49864-5158@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49865",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49865-ae89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49866",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49866-159b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49867",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49867-b47a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49868",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49868-8dce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47753",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47753-45cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47754",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47754-a412@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49869",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49869-f804@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49870",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49870-44f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49871",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49871-1293@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49872",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49872-16d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49873",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49873-3190@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47755",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47755-2cb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47756",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47756-1c60@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47757",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47757-2b1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49874",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49874-6deb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49876",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49876-7fe2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49877",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49877-038a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49885",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49885-d5d0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49886",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49886-3477@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49887",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49887-04ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49888",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49888-027c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49889",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49889-6140@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49890",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49890-ba65@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49891",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49891-931a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49892",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49892-b04d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49893",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49893-72a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49894",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49894-08a0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49858",
"url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49858-b7c4@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49859",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49859-9917@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49860",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49860-2a48@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49861",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49861-5288@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49862",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49862-b995@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50022",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50022-0531@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50023",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50023-0e72@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50024",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50024-a052@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49955",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49955-f517@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50025",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50025-38d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50026",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50026-a7cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50027",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50027-91e1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50028",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50028-5655@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49959",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49959-ce09@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49960",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49960-f9cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49961",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49961-7541@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49962",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49962-8d16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49963",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49963-a198@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49964",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49964-e06e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50043",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50043-86f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50044",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50044-2ee1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50045",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50045-283d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50046",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50046-a9b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50047",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50047-7a27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50048",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50048-f299@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50049",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50049-26da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50055",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50055-7d1f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50056",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50056-78bf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50057",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50057-d046@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50058",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50058-e827@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50059",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50059-4ccd@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50060",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50060-6994@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49985",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49985-0b2a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49986",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49986-19eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49987",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49987-e897@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50061",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50061-50ab@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50062",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50062-1ea1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50063",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50063-1a59@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50064",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50064-33d1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50065",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50065-c751@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49988",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49988-89d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49989",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49989-8165@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49990",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49990-c3e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49991",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49991-59d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49992",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49992-fd66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49993",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49993-5b57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49994",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49994-de99@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49995",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49995-ec59@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49996",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49996-0d29@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49997",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49997-0d01@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49998",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-49998-1a69@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49999",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-49999-e815@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50000",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50000-c542@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50001",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50001-67e4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50002",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50002-bdfd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48983",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48983-7e0c@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48987",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48987-c88b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48988",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48988-188f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48989",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48989-54c3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48990",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48990-1cf1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48991",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48991-3987@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48992",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48992-2962@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49850",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2024-49850-4cc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49851",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2024-49851-edd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49852",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2024-49852-875e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49016",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49016-c7bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49017",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49017-ae90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49018",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49018-7ee3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49019",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49019-435d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49853",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49853-b3ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49854",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49854-1ba5@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49855",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49855-8997@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49020",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49020-2d32@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49021",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49021-9979@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49022",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49022-c605@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49023",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49023-381d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49024",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49024-e31a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49856",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2024-49856-f5f7@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49857",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2024-49857-7233@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49025",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49025-4bcc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49026",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49026-f8d1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49027",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49027-3006@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49028",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49028-78e7@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49029",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49029-0ffd@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49030",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49030-cee8@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49031",
"url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49031-5b75@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49032",
"url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49032-d2a1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49033",
"url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49033-a8c6@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52917",
"url": "https://lore.kernel.org/linux-cve-announce/2024102100-CVE-2023-52917-f16d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47675",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47675-643d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47722",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47722-dc6e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47723",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47723-d904@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47724",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47724-c771@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47725",
"url": "https://lore.kernel.org/linux-cve-announce/2024102104-CVE-2024-47725-f698@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47676",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47676-016b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47727",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47727-1049@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47728",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47728-824a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47677",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47677-714d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47678",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47678-0b1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47679",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47679-e793@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47680",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47680-194f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47681",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47681-bd36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47682",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47682-0582@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47683",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47683-8cf2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47684",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47684-4869@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47736",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47736-712a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47737",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47737-b77e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47738",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47738-3f0e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47685",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47685-af1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47686",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47686-e46a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47687",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47687-9a03@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47739",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47739-8bc4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47740",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47740-ae86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47688",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47688-0fe1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47689",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47689-cdec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47690",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47690-113f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47741",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47741-5974@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47742",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47742-b72d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47743",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47743-77c3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47691",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47691-ab21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47692",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47692-38d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47744",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47744-7571@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47745",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47745-42e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47746",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47746-f737@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47693",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47693-f12d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47694",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47694-5594@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47695",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47695-2d7b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47747",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47747-8dca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47748",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47748-a134@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47696",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47696-e1f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47697",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47697-5277@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47698",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47698-d5fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47699",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47699-c54c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47700",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47700-00ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47701",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47701-7db5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47702",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47702-c5c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47703",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47703-36ea@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49875",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49875-02ba@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47704",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47704-d937@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47705",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47705-12bc@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47706",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47706-7312@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49883",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49883-ca93@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49884",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49884-fa56@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47707",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47707-d8db@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47708",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47708-2b8f@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47709",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47709-8e66@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47710",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47710-3882@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47711",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47711-349d@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47712",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47712-13c2@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47713",
"url": "https://lore.kernel.org/linux-cve-announce/2024102119-CVE-2024-47713-2624@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47714",
"url": "https://lore.kernel.org/linux-cve-announce/2024102119-CVE-2024-47714-f88b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47715",
"url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47715-ff4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47716",
"url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47716-72df@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47717",
"url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47717-f7fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47718",
"url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47718-c7cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47719",
"url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47719-09a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47720",
"url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47720-c007@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47721",
"url": "https://lore.kernel.org/linux-cve-announce/2024102122-CVE-2024-47721-cb0a@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49915",
"url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49915-42ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49916",
"url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49916-3384@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49920",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49920-038d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49921",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49921-621b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49922",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49922-5435@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49923",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49923-3462@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49924",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49924-93af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49925",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49925-b469@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49926",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49926-f707@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49927",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49927-86cf@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49928",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49928-05d6@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49929",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49929-1031@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49930",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49930-34e8@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50019",
"url": "https://lore.kernel.org/linux-cve-announce/2024102126-CVE-2024-50019-5896@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50020",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50020-e41a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50021",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50021-d60d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49956",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49956-5278@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50029",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50029-8df2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49957",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49957-3302@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49958",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49958-1bc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50030",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50030-13ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50031",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50031-c158@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50032",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50032-e7ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50033",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50033-ce5e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50034",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50034-46ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49965",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49965-9ed0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49966",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49966-2893@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50035",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50035-82d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50036",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50036-9d91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50037",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50037-770e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50038",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50038-dc41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50039",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50039-41b0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50040",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50040-f156@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49967",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49967-a58a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49968",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49968-ce10@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49969",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49969-cf83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49970",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49970-a345@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49971",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49971-ad07@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50041",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50041-6118@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50042",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50042-ca9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49972",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49972-9c6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49973",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49973-8824@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49974",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49974-bda6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49975",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49975-4533@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49976",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49976-83a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49977",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49977-b657@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49978",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49978-2bff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49979",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49979-f897@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49980",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49980-da73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49981",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49981-0fb7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49982",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49982-c6b7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49983",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49983-275e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49984",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49984-e47f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48946",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2022-48946-5989@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48947",
"url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48947-0ab5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48948",
"url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48948-588a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48949",
"url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48949-a7a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48950",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48950-dc5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48951",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48951-da5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48952",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48952-a932@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48953",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48953-c6c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48954",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48954-30f2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48955",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48955-d31e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48956",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48956-75c8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48957",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48957-8250@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48958",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48958-bb88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48959",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48959-6120@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48960",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48960-c9af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48961",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48961-d44b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48962",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48962-1842@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48963",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48963-9cf2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48964",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48964-8230@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48965",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48965-0039@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48966",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48966-d8f6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48967",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48967-c2ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48968",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48968-9b4a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48969",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48969-8fe7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48970",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48970-7c96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48971",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48971-6025@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48972",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48972-4ccd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48973",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48973-a0e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48974",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48974-d2d0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48975",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48975-d7f9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48976",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48976-2980@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48977",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48977-0990@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48978",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48978-8a19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48979",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48979-d40f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48980",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48980-0fec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48981",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48981-a877@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48982",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48982-717d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48984",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48984-ea9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48985",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48985-40b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48986",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48986-cd7d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48993",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48993-8b27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48994",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48994-530f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48995",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48995-8d2e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48996",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48996-e9ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48997",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48997-cd65@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48998",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48998-1016@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48999",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-48999-c5fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49000",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49000-2c9c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49001",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49001-589c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49002",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49002-5b24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49003",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49003-482c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49004",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49004-18ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49005",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49005-c5ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49006",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49006-83c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49007",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49007-c02b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49008",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49008-d62f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49009",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49009-9bee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49010",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49010-f8e1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49011",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49011-069a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49012",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49012-8eb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49013",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49013-dd61@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49014",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49014-1627@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49015",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49015-1fd0@gregkh/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7088-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04",
"url": "https://ubuntu.com/security/notices/USN-7088-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06",
"url": "https://ubuntu.com/security/notices/USN-7088-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11",
"url": "https://ubuntu.com/security/notices/USN-7100-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12813.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7100-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12815.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7088-5"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14500-1 vom 2024-11-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7119-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4038-1 vom 2024-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7123-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5818 vom 2024-11-24",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00233.html"
},
{
"category": "external",
"summary": "Google Container-Optimized OS Release Notes vom 2024-11-18",
"url": "https://cloud.google.com/container-optimized-os/docs/release-notes#November_18_2024"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4081-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4157-1 vom 2024-12-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019904.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09",
"url": "https://linux.oracle.com/errata/ELSA-2024-12868.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09",
"url": "https://ubuntu.com/security/notices/USN-7144-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10942 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10942"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10939"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10943 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10943"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10944 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10944"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-10939.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10943 vom 2024-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-10943.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7154-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7155-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7156-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4317-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4313-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PCO2TL4OCZ4YUXTF7OMLI6WH3WKDUC2G/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17",
"url": "https://linux.oracle.com/errata/ELSA-2024-12884.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7170-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7170-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7173-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4345-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4346-1 vom 2024-12-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2FJJW5HEWYSYWAJBRWARBIZ4AQHAXLNG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7169-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7167-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7167-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7166-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11486 vom 2024-12-19",
"url": "https://access.redhat.com/errata/RHSA-2024:11486"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2024-12887.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:10944 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:10944"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-2 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7169-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-074 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4388-1 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-059 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-059.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-088 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-088.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7166-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4397-1 vom 2024-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-2 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7173-2"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4008 vom 2025-01-03",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11486 vom 2025-01-07",
"url": "https://linux.oracle.com/errata/ELSA-2024-11486.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7154-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7184-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7184-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7187-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7187-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7186-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7183-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7183-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-3 vom 2025-01-07",
"url": "https://ubuntu.com/security/notices/USN-7169-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7167-2 vom 2025-01-07",
"url": "https://ubuntu.com/security/notices/USN-7167-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-4 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7169-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7185-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7185-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7196-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7195-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7194-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7186-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-5 vom 2025-01-10",
"url": "https://ubuntu.com/security/notices/USN-7169-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0089-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0090-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020101.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0106-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14",
"url": "https://ubuntu.com/security/notices/USN-7195-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0094-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0097-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0105-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0098-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020106.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0100-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0103-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0108-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020111.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0111-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2IXCN5JTEUUWORLKQVOQYQKMHTJ73CSG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0114-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YC7MKFCHLBJHUQM2SLPOGVG4DUWP2J4E/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0112-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VKNKHAJX3LTXNPTXUJXVJL67P2P7Z7YO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0110-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PLWCG227VUGPKNXHW6FOCW727UUPVLLU/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-3 vom 2025-01-15",
"url": "https://ubuntu.com/security/notices/USN-7173-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0124-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0132-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/U2TCRAW6MN33ZU3TBEQGGYRWFSJ6BPOU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0131-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0123-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020126.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0136-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2VG6PE7ZMNWIM7E4TIKCXL4DVBGBXJN5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0137-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHBMZ4MND2ONRG4N26VJNJGAZBXMYEDV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0138-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ET3TDUWYDTZV554NRC7LB5HGM4TCIIGZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0146-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C6ANXHEO54VUUFEWI6QYB2M3L2SS7OOW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0172-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020164.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0177-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020162.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0164-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0185-1 vom 2025-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020171.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0180-1 vom 2025-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020174.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0181-1 vom 2025-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-079 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-079.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-078 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0240-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCBYAV5OJRXD362FDCZUSIHNHOURONCF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0239-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBKJOKHJGUZRHPVCGSRZVBF6ZMI7KJY7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0238-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNU4IXTEAXCI7QNPC2AVXZICYTGC4XXI/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-090 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-061 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-061.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0249-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0253-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0246-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0245-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0244-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0254-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020213.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0260-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0264-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0243-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20066 vom 2025-01-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-20066.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7237-1 vom 2025-01-28",
"url": "https://ubuntu.com/security/notices/USN-7237-1"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14705-1 vom 2025-01-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-198 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-198.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-196 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-196.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-092 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-092.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-195 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-195.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-197 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-197.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2745 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2745.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1957 vom 2025-02-05",
"url": "https://alas.aws.amazon.com/ALAS-2025-1957.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5860 vom 2025-02-08",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00023.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20095 vom 2025-02-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20095.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0410-1 vom 2025-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0428-1 vom 2025-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0426-1 vom 2025-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020303.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0440-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020319.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20100 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0462-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CNVHBWUSJZEY34QR6GDPRY55WG3UIDSL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0476-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VFHWMM4XIDZD22QFLM3OSRWWSFFBUTZM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0494-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6OLOLTOPB2LMYQP5ZEWFA5S443WHFDIQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0486-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XWFV7VUE5TX6GKXVI46R6ZIDRFEXHKUZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0489-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OCZ53J3OQFQB3VZIF7V6BL32FWNAV3CH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0462-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNVHBWUSJZEY34QR6GDPRY55WG3UIDSL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0449-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020322.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0494-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6OLOLTOPB2LMYQP5ZEWFA5S443WHFDIQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0487-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QIBJK3XANPM2U6AEOTGJ27N3L472DCRE/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0455-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020321.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0452-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020320.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0465-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IZBNMZ4JWAINQUJYDC5JJYGAKWUST46Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0499-1 vom 2025-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0557-1 vom 2025-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0564-1 vom 2025-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1960 vom 2025-02-19",
"url": "https://alas.aws.amazon.com/ALAS-2025-1960.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7276-1 vom 2025-02-19",
"url": "https://ubuntu.com/security/notices/USN-7276-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7277-1 vom 2025-02-19",
"url": "https://ubuntu.com/security/notices/USN-7277-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24",
"url": "https://ubuntu.com/security/notices/USN-7288-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-1 vom 2025-02-24",
"url": "https://ubuntu.com/security/notices/USN-7289-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7291-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7291-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7288-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7293-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7293-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7184085 vom 2025-02-25",
"url": "https://www.ibm.com/support/pages/node/7184085"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-2 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7289-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7289-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7295-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2759 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2759.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7294-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-094 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-094.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-063 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-063.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7301-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7301-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7294-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7289-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7308-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7294-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7303-2 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7303-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7310-1 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7310-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7311-1 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7311-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4075 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4076 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03",
"url": "https://ubuntu.com/security/notices/USN-7294-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7303-3 vom 2025-03-03",
"url": "https://ubuntu.com/security/notices/USN-7303-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2270 vom 2025-03-05",
"url": "https://access.redhat.com/errata/RHSA-2025:2270"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1912 vom 2025-03-05",
"url": "https://access.redhat.com/errata/RHSA-2025:1912"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7333-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7333-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7332-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0784-1 vom 2025-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7331-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7331-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-203 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-203.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-204 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-204.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-205 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-205.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-202 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-202.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1961 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/ALAS-2025-1961.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2775 vom 2025-03-07",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2775.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20152 vom 2025-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20152.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185244 vom 2025-03-10",
"url": "https://www.ibm.com/support/pages/node/7185244"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7344-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7342-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7342-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-2 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7332-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-3 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7332-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-2 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7344-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-082 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-082.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-083 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-083.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1966 vom 2025-03-17",
"url": "https://alas.aws.amazon.com/ALAS-2025-1966.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20190 vom 2025-03-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-20190.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2800 vom 2025-03-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2800.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7388-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7386-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7386-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7387-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7385-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7385-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7383-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7383-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7384-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7384-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7383-2 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7383-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7391-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7389-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7393-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7390-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4102 vom 2025-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7384-2 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7384-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7401-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7403-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7403-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1114-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GFUVKSUXYRNYGI6ZX3V2THDXSA47UNT/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7407-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1121-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/N43CHCB2GP64EHTUHJOPVKKKNZQRWP2Y/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1119-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SBLYTUS3TCCWSW237VUH6AAY5NVYUZ3T/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1139-1 vom 2025-04-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MMCQJLNQTFQY3ASC2RY677DDWALMOJCQ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7413-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1123-1 vom 2025-04-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RBJNUDBE6VPHIDCFIVWE7AFUQ2E2P436/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7421-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7428-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7428-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7428-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7428-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1225-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMQIDOZZ3LRBGKAI3UWUKDCXNJWRXYGY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1213-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/64D5YFJLDESGQOR3OGPOEV5S4M3DYYAU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1231-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020693.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20271 vom 2025-04-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-20271.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1236-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020691.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1254-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020695.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1248-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020697.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1259-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020698.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1260-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5C772I5KLAAUMXFCSPXGHE5ETFPZGIIY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1278-1 vom 2025-04-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020701.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1262-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YQ5OGGLUK4JYNQDMHQJCE7NAM5KWAUQ6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2826 vom 2025-04-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2826.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1970 vom 2025-04-17",
"url": "https://alas.aws.amazon.com/ALAS-2025-1970.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7451-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7453-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7452-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7449-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7450-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7449-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7459-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7463-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7461-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7461-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7458-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5907 vom 2025-04-27",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00069.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7459-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7468-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-227 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-227.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-224 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-224.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-100 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-100.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-226 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-226.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-225 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-225.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-228 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-228.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html"
},
{
"category": "external",
"summary": "Kyocera Downloads",
"url": "https://www.kyoceradocumentsolutions.us/en/support/downloads.name-L3VzL2VuL3NvZnR3YXJlL0tZT0NFUkFERVZJQ0VNQU5BR0VS.html#tab=application"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-3 vom 2025-05-02",
"url": "https://ubuntu.com/security/notices/USN-7461-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4509 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4509"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13",
"url": "https://ubuntu.com/security/notices/USN-7506-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7532 vom 2025-05-14",
"url": "https://access.redhat.com/errata/RHSA-2025:7532"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:6966"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7531 vom 2025-05-14",
"url": "https://access.redhat.com/errata/RHSA-2025:7531"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7676 vom 2025-05-15",
"url": "https://access.redhat.com/errata/RHSA-2025:7676"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7683 vom 2025-05-16",
"url": "https://access.redhat.com/errata/RHSA-2025:7683"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7516-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7514-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7531 vom 2025-05-17",
"url": "http://linux.oracle.com/errata/ELSA-2025-7531.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7515-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7512-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7517-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7518-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7522-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7515-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7516-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7511-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7523-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7517-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7516-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
"url": "https://ubuntu.com/security/notices/USN-7516-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7524-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7517-3"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7516-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
"url": "https://ubuntu.com/security/notices/USN-7510-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7510-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7510-8"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-9"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-7"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20285-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20191-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06",
"url": "https://ubuntu.com/security/notices/USN-7553-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-6"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01840-1 vom 2025-06-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021434.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01853-1 vom 2025-06-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021441.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01869-1 vom 2025-06-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021449.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01873-1 vom 2025-06-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021451.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20372 vom 2025-06-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-20372.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20386-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021483.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20388-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021481.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20384-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021485.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01930-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021497.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20381-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021488.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01932-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021501.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20400-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021522.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250613-0011 vom 2025-06-13",
"url": "https://security.netapp.com/advisory/NTAP-20250613-0011"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20397-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021525.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-095 vom 2025-06-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-095.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250627-0002 vom 2025-06-27",
"url": "https://security.netapp.com/advisory/NTAP-20250627-0002"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250627-0005 vom 2025-06-27",
"url": "https://security.netapp.com/advisory/NTAP-20250627-0005"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01",
"url": "https://ubuntu.com/security/notices/USN-7607-1"
},
{
"category": "external",
"summary": "SEM 2025.2.1 release notes vom 2025-07-02",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-3 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7608-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-2 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7608-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-1 vom 2025-07-01",
"url": "https://ubuntu.com/security/notices/USN-7608-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7607-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-4 vom 2025-07-03",
"url": "https://ubuntu.com/security/notices/USN-7608-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7627-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-5 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7608-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08",
"url": "https://ubuntu.com/security/notices/USN-7627-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7607-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0113-1 vom 2025-07-10",
"url": "https://ubuntu.com/security/notices/LSN-0113-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-6 vom 2025-07-11",
"url": "https://ubuntu.com/security/notices/USN-7608-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7640-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7653-1 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7653-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-1 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7651-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7652-1 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7652-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-2 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7651-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7655-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-3 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7651-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7654-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-4 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7651-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-5 vom 2025-07-24",
"url": "https://ubuntu.com/security/notices/USN-7651-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-6 vom 2025-07-24",
"url": "https://ubuntu.com/security/notices/USN-7651-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25",
"url": "https://ubuntu.com/security/notices/USN-7671-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7671-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7654-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-7 vom 2025-07-30",
"url": "https://ubuntu.com/security/notices/USN-7608-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-2 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-1 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-3 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-3"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-100 vom 2025-08-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-100.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-105 vom 2025-08-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-105.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04",
"url": "https://ubuntu.com/security/notices/USN-7671-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7686-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-101 vom 2025-08-09",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-101.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-106 vom 2025-08-09",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-106.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13",
"url": "https://ubuntu.com/security/notices/USN-7685-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-1 vom 2025-08-19",
"url": "https://ubuntu.com/security/notices/USN-7701-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-2 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7701-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-3 vom 2025-08-21",
"url": "https://ubuntu.com/security/notices/USN-7701-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7712-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7711-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7727-1 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7727-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7727-2 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7727-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7712-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7727-3 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7727-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03",
"url": "https://ubuntu.com/security/notices/USN-7737-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15008 vom 2025-09-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-15008.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03097-1 vom 2025-09-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022420.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03108-1 vom 2025-09-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022413.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJXQ5TFHHXOY34RCSJPZ32PXICETJJAT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03130-1 vom 2025-09-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OI7XTGACEWQ2UDCZMU7BMJ53EJTK4DLT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03135-1 vom 2025-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022453.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03156-1 vom 2025-09-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSLXEYDHEPXZRRM6QVD2CNPFQE4HV4IH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03175-1 vom 2025-09-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022497.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03181-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022513.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03186-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022508.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03191-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022516.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03190-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022518.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03209-1 vom 2025-09-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYKN5NGIGIUIQOD7ME5J7EMEHPSJ3AGG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03223-1 vom 2025-09-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022534.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03226-1 vom 2025-09-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEHWYIR3R7GHFMEAF5GZVX6OYPVERDIJ/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-089 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-089.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7755-1 vom 2025-09-17",
"url": "https://ubuntu.com/security/notices/USN-7755-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20714-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022558.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7755-2 vom 2025-09-17",
"url": "https://ubuntu.com/security/notices/USN-7755-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20711-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022561.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20703-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022569.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20698-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022573.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03272-1 vom 2025-09-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022589.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03290-1 vom 2025-09-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022602.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6009 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2025-09-22T22:00:00.000+00:00",
"generator": {
"date": "2025-09-23T05:02:10.420+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-3251",
"initial_release_date": "2024-10-21T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-21T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-17T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-24T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-11-25T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-28T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-02T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-09T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-12T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2024-12-22T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-01-02T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-01-07T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-01-15T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-01-16T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-19T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-20T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2025-01-27T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-28T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2025-02-03T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-04T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-05T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-09T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-02-10T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-11T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-17T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-19T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-24T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-02-27T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-03T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-04T23:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-05T23:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-03-06T23:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Oracle Linux und IBM aufgenommen"
},
{
"date": "2025-03-11T23:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-03-13T23:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-19T23:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-20T23:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-03-25T23:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-04-07T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-14T22:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-16T22:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-21T22:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-23T22:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-27T22:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-28T22:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-05T22:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-15T22:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von Ubuntu, SUSE und Debian aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von Ubuntu, Debian und Amazon aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-05T22:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "110",
"summary": "Neue Updates von Ubuntu, Amazon und SUSE aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "111",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "112",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-06-12T22:00:00.000+00:00",
"number": "113",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "114",
"summary": "Neue Updates von SUSE und NetApp aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "115",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "116",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "117",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "118",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "119",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "120",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "121",
"summary": "Neue Updates von Oracle Linux, Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "122",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-13T22:00:00.000+00:00",
"number": "123",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "124",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "125",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "126",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "127",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "128",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "129",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-23T22:00:00.000+00:00",
"number": "130",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-24T22:00:00.000+00:00",
"number": "131",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "132",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "133",
"summary": "Referenz(en) aufgenommen: EUVD-2025-22875"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "134",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "135",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "136",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "137",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "138",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-10T22:00:00.000+00:00",
"number": "139",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "140",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "141",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "142",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-20T22:00:00.000+00:00",
"number": "143",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "144",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "145",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "146",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "147",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "148",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "149",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "150",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-09-10T22:00:00.000+00:00",
"number": "151",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-11T22:00:00.000+00:00",
"number": "152",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "153",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "154",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "155",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-09-17T22:00:00.000+00:00",
"number": "156",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-09-18T22:00:00.000+00:00",
"number": "157",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "158",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
}
],
"status": "final",
"version": "158"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T034583",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11 IF02",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF02",
"product_id": "T041397"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11 IF02",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11 IF02",
"product_id": "T041397-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if02"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Kyocera Printer",
"product": {
"name": "Kyocera Printer",
"product_id": "T015471",
"product_identification_helper": {
"cpe": "cpe:/h:kyocera:printer:-"
}
}
}
],
"category": "vendor",
"name": "Kyocera"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Baseboard Management Controller",
"product": {
"name": "NetApp AFF Baseboard Management Controller",
"product_id": "T025086",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:aff:::baseboard_management_controller"
}
}
}
],
"category": "product_name",
"name": "AFF"
},
{
"branches": [
{
"category": "product_version",
"name": "for VMware vSphere",
"product": {
"name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
"product_id": "T025152",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
}
}
}
],
"category": "product_name",
"name": "ActiveIQ Unified Manager"
},
{
"branches": [
{
"category": "product_version",
"name": "Baseboard Management Controller",
"product": {
"name": "NetApp FAS Baseboard Management Controller",
"product_id": "T043535",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:baseboard_management_controller"
}
}
}
],
"category": "product_name",
"name": "FAS"
},
{
"category": "product_name",
"name": "NetApp StorageGRID",
"product": {
"name": "NetApp StorageGRID",
"product_id": "920206",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:storagegrid:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T046484",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T042774",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T042775",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager \u003c2025.2.1",
"product_id": "T044986"
}
},
{
"category": "product_version",
"name": "2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager 2025.2.1",
"product_id": "T044986-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10044",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2016-10044"
},
{
"cve": "CVE-2022-48946",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48946"
},
{
"cve": "CVE-2022-48947",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48947"
},
{
"cve": "CVE-2022-48948",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48948"
},
{
"cve": "CVE-2022-48949",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48949"
},
{
"cve": "CVE-2022-48950",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48950"
},
{
"cve": "CVE-2022-48951",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48951"
},
{
"cve": "CVE-2022-48952",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48952"
},
{
"cve": "CVE-2022-48953",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48953"
},
{
"cve": "CVE-2022-48954",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48954"
},
{
"cve": "CVE-2022-48955",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48955"
},
{
"cve": "CVE-2022-48956",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48956"
},
{
"cve": "CVE-2022-48957",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48957"
},
{
"cve": "CVE-2022-48958",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48958"
},
{
"cve": "CVE-2022-48959",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48959"
},
{
"cve": "CVE-2022-48960",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48960"
},
{
"cve": "CVE-2022-48961",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48961"
},
{
"cve": "CVE-2022-48962",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48962"
},
{
"cve": "CVE-2022-48963",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48963"
},
{
"cve": "CVE-2022-48964",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48964"
},
{
"cve": "CVE-2022-48965",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48965"
},
{
"cve": "CVE-2022-48966",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48966"
},
{
"cve": "CVE-2022-48967",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48967"
},
{
"cve": "CVE-2022-48968",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48968"
},
{
"cve": "CVE-2022-48969",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48969"
},
{
"cve": "CVE-2022-48970",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48970"
},
{
"cve": "CVE-2022-48971",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48971"
},
{
"cve": "CVE-2022-48972",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48972"
},
{
"cve": "CVE-2022-48973",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48973"
},
{
"cve": "CVE-2022-48974",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48974"
},
{
"cve": "CVE-2022-48975",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48975"
},
{
"cve": "CVE-2022-48976",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48976"
},
{
"cve": "CVE-2022-48977",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48977"
},
{
"cve": "CVE-2022-48978",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48978"
},
{
"cve": "CVE-2022-48979",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48979"
},
{
"cve": "CVE-2022-48980",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48980"
},
{
"cve": "CVE-2022-48981",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48981"
},
{
"cve": "CVE-2022-48982",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48982"
},
{
"cve": "CVE-2022-48983",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48983"
},
{
"cve": "CVE-2022-48984",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48984"
},
{
"cve": "CVE-2022-48985",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48985"
},
{
"cve": "CVE-2022-48986",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48986"
},
{
"cve": "CVE-2022-48987",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48987"
},
{
"cve": "CVE-2022-48988",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48988"
},
{
"cve": "CVE-2022-48989",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48989"
},
{
"cve": "CVE-2022-48990",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48990"
},
{
"cve": "CVE-2022-48991",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48991"
},
{
"cve": "CVE-2022-48992",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48992"
},
{
"cve": "CVE-2022-48993",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48993"
},
{
"cve": "CVE-2022-48994",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48994"
},
{
"cve": "CVE-2022-48995",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48995"
},
{
"cve": "CVE-2022-48996",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48996"
},
{
"cve": "CVE-2022-48997",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48997"
},
{
"cve": "CVE-2022-48998",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48998"
},
{
"cve": "CVE-2022-48999",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48999"
},
{
"cve": "CVE-2022-49000",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49000"
},
{
"cve": "CVE-2022-49001",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49001"
},
{
"cve": "CVE-2022-49002",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49002"
},
{
"cve": "CVE-2022-49003",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49003"
},
{
"cve": "CVE-2022-49004",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49004"
},
{
"cve": "CVE-2022-49005",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49005"
},
{
"cve": "CVE-2022-49006",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49006"
},
{
"cve": "CVE-2022-49007",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49007"
},
{
"cve": "CVE-2022-49008",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49008"
},
{
"cve": "CVE-2022-49009",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49009"
},
{
"cve": "CVE-2022-49010",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49010"
},
{
"cve": "CVE-2022-49011",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49011"
},
{
"cve": "CVE-2022-49012",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49012"
},
{
"cve": "CVE-2022-49013",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49013"
},
{
"cve": "CVE-2022-49014",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49014"
},
{
"cve": "CVE-2022-49015",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49015"
},
{
"cve": "CVE-2022-49016",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49016"
},
{
"cve": "CVE-2022-49017",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49017"
},
{
"cve": "CVE-2022-49018",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49018"
},
{
"cve": "CVE-2022-49019",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49019"
},
{
"cve": "CVE-2022-49020",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49020"
},
{
"cve": "CVE-2022-49021",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49021"
},
{
"cve": "CVE-2022-49022",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49022"
},
{
"cve": "CVE-2022-49023",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49023"
},
{
"cve": "CVE-2022-49024",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49024"
},
{
"cve": "CVE-2022-49025",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49025"
},
{
"cve": "CVE-2022-49026",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49026"
},
{
"cve": "CVE-2022-49027",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49027"
},
{
"cve": "CVE-2022-49028",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49028"
},
{
"cve": "CVE-2022-49029",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49029"
},
{
"cve": "CVE-2022-49030",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49030"
},
{
"cve": "CVE-2022-49031",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49031"
},
{
"cve": "CVE-2022-49032",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49032"
},
{
"cve": "CVE-2022-49033",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49033"
},
{
"cve": "CVE-2023-52917",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-52917"
},
{
"cve": "CVE-2023-52918",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-52918"
},
{
"cve": "CVE-2023-52919",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-52919"
},
{
"cve": "CVE-2023-6270",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-6270"
},
{
"cve": "CVE-2024-47675",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47675"
},
{
"cve": "CVE-2024-47676",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47676"
},
{
"cve": "CVE-2024-47677",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47677"
},
{
"cve": "CVE-2024-47678",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47678"
},
{
"cve": "CVE-2024-47679",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47679"
},
{
"cve": "CVE-2024-47680",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47680"
},
{
"cve": "CVE-2024-47681",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47681"
},
{
"cve": "CVE-2024-47682",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47682"
},
{
"cve": "CVE-2024-47683",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47683"
},
{
"cve": "CVE-2024-47684",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47684"
},
{
"cve": "CVE-2024-47685",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47685"
},
{
"cve": "CVE-2024-47686",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47686"
},
{
"cve": "CVE-2024-47687",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47687"
},
{
"cve": "CVE-2024-47688",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47688"
},
{
"cve": "CVE-2024-47689",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47689"
},
{
"cve": "CVE-2024-47690",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47690"
},
{
"cve": "CVE-2024-47691",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47691"
},
{
"cve": "CVE-2024-47692",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47692"
},
{
"cve": "CVE-2024-47693",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47693"
},
{
"cve": "CVE-2024-47694",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47694"
},
{
"cve": "CVE-2024-47695",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47695"
},
{
"cve": "CVE-2024-47696",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47696"
},
{
"cve": "CVE-2024-47697",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47697"
},
{
"cve": "CVE-2024-47698",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47698"
},
{
"cve": "CVE-2024-47699",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47699"
},
{
"cve": "CVE-2024-47700",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47700"
},
{
"cve": "CVE-2024-47701",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47701"
},
{
"cve": "CVE-2024-47702",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47702"
},
{
"cve": "CVE-2024-47703",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47703"
},
{
"cve": "CVE-2024-47704",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47704"
},
{
"cve": "CVE-2024-47705",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47705"
},
{
"cve": "CVE-2024-47706",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47706"
},
{
"cve": "CVE-2024-47707",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47707"
},
{
"cve": "CVE-2024-47708",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47708"
},
{
"cve": "CVE-2024-47709",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47709"
},
{
"cve": "CVE-2024-47710",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47710"
},
{
"cve": "CVE-2024-47711",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47711"
},
{
"cve": "CVE-2024-47712",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47712"
},
{
"cve": "CVE-2024-47713",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47713"
},
{
"cve": "CVE-2024-47714",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47714"
},
{
"cve": "CVE-2024-47715",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47715"
},
{
"cve": "CVE-2024-47716",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47716"
},
{
"cve": "CVE-2024-47717",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47717"
},
{
"cve": "CVE-2024-47718",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47718"
},
{
"cve": "CVE-2024-47719",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47719"
},
{
"cve": "CVE-2024-47720",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47720"
},
{
"cve": "CVE-2024-47721",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47721"
},
{
"cve": "CVE-2024-47722",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47722"
},
{
"cve": "CVE-2024-47723",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47723"
},
{
"cve": "CVE-2024-47724",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47724"
},
{
"cve": "CVE-2024-47725",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47725"
},
{
"cve": "CVE-2024-47726",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47726"
},
{
"cve": "CVE-2024-47727",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47727"
},
{
"cve": "CVE-2024-47728",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47728"
},
{
"cve": "CVE-2024-47729",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47729"
},
{
"cve": "CVE-2024-47730",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47730"
},
{
"cve": "CVE-2024-47731",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47731"
},
{
"cve": "CVE-2024-47732",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47732"
},
{
"cve": "CVE-2024-47733",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47733"
},
{
"cve": "CVE-2024-47734",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47734"
},
{
"cve": "CVE-2024-47735",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47735"
},
{
"cve": "CVE-2024-47736",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47736"
},
{
"cve": "CVE-2024-47737",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47737"
},
{
"cve": "CVE-2024-47738",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47738"
},
{
"cve": "CVE-2024-47739",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47739"
},
{
"cve": "CVE-2024-47740",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47740"
},
{
"cve": "CVE-2024-47741",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47741"
},
{
"cve": "CVE-2024-47742",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47742"
},
{
"cve": "CVE-2024-47743",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47743"
},
{
"cve": "CVE-2024-47744",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47744"
},
{
"cve": "CVE-2024-47745",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47745"
},
{
"cve": "CVE-2024-47746",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47746"
},
{
"cve": "CVE-2024-47747",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47747"
},
{
"cve": "CVE-2024-47748",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47748"
},
{
"cve": "CVE-2024-47749",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47749"
},
{
"cve": "CVE-2024-47750",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47750"
},
{
"cve": "CVE-2024-47751",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47751"
},
{
"cve": "CVE-2024-47752",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47752"
},
{
"cve": "CVE-2024-47753",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47753"
},
{
"cve": "CVE-2024-47754",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47754"
},
{
"cve": "CVE-2024-47755",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47755"
},
{
"cve": "CVE-2024-47756",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47756"
},
{
"cve": "CVE-2024-47757",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47757"
},
{
"cve": "CVE-2024-49850",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49850"
},
{
"cve": "CVE-2024-49851",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49851"
},
{
"cve": "CVE-2024-49852",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49852"
},
{
"cve": "CVE-2024-49853",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49853"
},
{
"cve": "CVE-2024-49854",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49854"
},
{
"cve": "CVE-2024-49855",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49855"
},
{
"cve": "CVE-2024-49856",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49856"
},
{
"cve": "CVE-2024-49857",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49857"
},
{
"cve": "CVE-2024-49858",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49858"
},
{
"cve": "CVE-2024-49859",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49859"
},
{
"cve": "CVE-2024-49860",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49860"
},
{
"cve": "CVE-2024-49861",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49861"
},
{
"cve": "CVE-2024-49862",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49862"
},
{
"cve": "CVE-2024-49863",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49863"
},
{
"cve": "CVE-2024-49864",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49864"
},
{
"cve": "CVE-2024-49865",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49865"
},
{
"cve": "CVE-2024-49866",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49866"
},
{
"cve": "CVE-2024-49867",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49867"
},
{
"cve": "CVE-2024-49868",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49868"
},
{
"cve": "CVE-2024-49869",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49869"
},
{
"cve": "CVE-2024-49870",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49870"
},
{
"cve": "CVE-2024-49871",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49871"
},
{
"cve": "CVE-2024-49872",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49872"
},
{
"cve": "CVE-2024-49873",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49873"
},
{
"cve": "CVE-2024-49874",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49874"
},
{
"cve": "CVE-2024-49875",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49875"
},
{
"cve": "CVE-2024-49876",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49876"
},
{
"cve": "CVE-2024-49877",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49877"
},
{
"cve": "CVE-2024-49878",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49878"
},
{
"cve": "CVE-2024-49879",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49879"
},
{
"cve": "CVE-2024-49880",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49880"
},
{
"cve": "CVE-2024-49881",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49881"
},
{
"cve": "CVE-2024-49882",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49882"
},
{
"cve": "CVE-2024-49883",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49883"
},
{
"cve": "CVE-2024-49884",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49884"
},
{
"cve": "CVE-2024-49885",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49885"
},
{
"cve": "CVE-2024-49886",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49886"
},
{
"cve": "CVE-2024-49887",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49887"
},
{
"cve": "CVE-2024-49888",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49888"
},
{
"cve": "CVE-2024-49889",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49889"
},
{
"cve": "CVE-2024-49890",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49890"
},
{
"cve": "CVE-2024-49891",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49891"
},
{
"cve": "CVE-2024-49892",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49892"
},
{
"cve": "CVE-2024-49893",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49893"
},
{
"cve": "CVE-2024-49894",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49894"
},
{
"cve": "CVE-2024-49895",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49895"
},
{
"cve": "CVE-2024-49896",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49896"
},
{
"cve": "CVE-2024-49897",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49897"
},
{
"cve": "CVE-2024-49898",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49898"
},
{
"cve": "CVE-2024-49899",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49899"
},
{
"cve": "CVE-2024-49900",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49900"
},
{
"cve": "CVE-2024-49901",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49901"
},
{
"cve": "CVE-2024-49902",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49902"
},
{
"cve": "CVE-2024-49903",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49903"
},
{
"cve": "CVE-2024-49905",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49905"
},
{
"cve": "CVE-2024-49906",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49906"
},
{
"cve": "CVE-2024-49907",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49907"
},
{
"cve": "CVE-2024-49908",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49908"
},
{
"cve": "CVE-2024-49909",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49909"
},
{
"cve": "CVE-2024-49911",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49911"
},
{
"cve": "CVE-2024-49912",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49912"
},
{
"cve": "CVE-2024-49913",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49913"
},
{
"cve": "CVE-2024-49914",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49914"
},
{
"cve": "CVE-2024-49915",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49915"
},
{
"cve": "CVE-2024-49916",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49916"
},
{
"cve": "CVE-2024-49917",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49917"
},
{
"cve": "CVE-2024-49918",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49918"
},
{
"cve": "CVE-2024-49919",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49919"
},
{
"cve": "CVE-2024-49920",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49920"
},
{
"cve": "CVE-2024-49921",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49921"
},
{
"cve": "CVE-2024-49922",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49922"
},
{
"cve": "CVE-2024-49923",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49923"
},
{
"cve": "CVE-2024-49924",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49924"
},
{
"cve": "CVE-2024-49925",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49925"
},
{
"cve": "CVE-2024-49926",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49926"
},
{
"cve": "CVE-2024-49927",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49927"
},
{
"cve": "CVE-2024-49928",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49928"
},
{
"cve": "CVE-2024-49929",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49929"
},
{
"cve": "CVE-2024-49930",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49930"
},
{
"cve": "CVE-2024-49931",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49931"
},
{
"cve": "CVE-2024-49932",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49932"
},
{
"cve": "CVE-2024-49933",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49933"
},
{
"cve": "CVE-2024-49934",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49934"
},
{
"cve": "CVE-2024-49935",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49935"
},
{
"cve": "CVE-2024-49936",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49936"
},
{
"cve": "CVE-2024-49937",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49937"
},
{
"cve": "CVE-2024-49938",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49938"
},
{
"cve": "CVE-2024-49939",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49939"
},
{
"cve": "CVE-2024-49940",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49940"
},
{
"cve": "CVE-2024-49941",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49941"
},
{
"cve": "CVE-2024-49942",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49942"
},
{
"cve": "CVE-2024-49943",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49943"
},
{
"cve": "CVE-2024-49944",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49944"
},
{
"cve": "CVE-2024-49945",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49945"
},
{
"cve": "CVE-2024-49946",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49946"
},
{
"cve": "CVE-2024-49947",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49947"
},
{
"cve": "CVE-2024-49948",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49948"
},
{
"cve": "CVE-2024-49949",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49949"
},
{
"cve": "CVE-2024-49950",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49950"
},
{
"cve": "CVE-2024-49951",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49951"
},
{
"cve": "CVE-2024-49952",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49952"
},
{
"cve": "CVE-2024-49953",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49953"
},
{
"cve": "CVE-2024-49954",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49954"
},
{
"cve": "CVE-2024-49955",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49955"
},
{
"cve": "CVE-2024-49956",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49956"
},
{
"cve": "CVE-2024-49957",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49957"
},
{
"cve": "CVE-2024-49958",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49958"
},
{
"cve": "CVE-2024-49959",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49959"
},
{
"cve": "CVE-2024-49960",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49960"
},
{
"cve": "CVE-2024-49961",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49961"
},
{
"cve": "CVE-2024-49962",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49962"
},
{
"cve": "CVE-2024-49963",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49963"
},
{
"cve": "CVE-2024-49964",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49964"
},
{
"cve": "CVE-2024-49965",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49965"
},
{
"cve": "CVE-2024-49966",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49966"
},
{
"cve": "CVE-2024-49967",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49967"
},
{
"cve": "CVE-2024-49968",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49968"
},
{
"cve": "CVE-2024-49969",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49969"
},
{
"cve": "CVE-2024-49970",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49970"
},
{
"cve": "CVE-2024-49971",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49971"
},
{
"cve": "CVE-2024-49972",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49972"
},
{
"cve": "CVE-2024-49973",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49973"
},
{
"cve": "CVE-2024-49974",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49974"
},
{
"cve": "CVE-2024-49975",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49975"
},
{
"cve": "CVE-2024-49976",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49976"
},
{
"cve": "CVE-2024-49977",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49977"
},
{
"cve": "CVE-2024-49978",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49978"
},
{
"cve": "CVE-2024-49979",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49979"
},
{
"cve": "CVE-2024-49980",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49980"
},
{
"cve": "CVE-2024-49981",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49981"
},
{
"cve": "CVE-2024-49982",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49982"
},
{
"cve": "CVE-2024-49983",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49983"
},
{
"cve": "CVE-2024-49984",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49984"
},
{
"cve": "CVE-2024-49985",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49985"
},
{
"cve": "CVE-2024-49986",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49986"
},
{
"cve": "CVE-2024-49987",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49987"
},
{
"cve": "CVE-2024-49988",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49988"
},
{
"cve": "CVE-2024-49989",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49989"
},
{
"cve": "CVE-2024-49990",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49990"
},
{
"cve": "CVE-2024-49991",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49991"
},
{
"cve": "CVE-2024-49992",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49992"
},
{
"cve": "CVE-2024-49993",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49993"
},
{
"cve": "CVE-2024-49994",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49994"
},
{
"cve": "CVE-2024-49995",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49995"
},
{
"cve": "CVE-2024-49996",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49996"
},
{
"cve": "CVE-2024-49997",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49997"
},
{
"cve": "CVE-2024-49998",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49998"
},
{
"cve": "CVE-2024-49999",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49999"
},
{
"cve": "CVE-2024-50000",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50000"
},
{
"cve": "CVE-2024-50001",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50001"
},
{
"cve": "CVE-2024-50002",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50002"
},
{
"cve": "CVE-2024-50003",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50003"
},
{
"cve": "CVE-2024-50004",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50004"
},
{
"cve": "CVE-2024-50005",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50005"
},
{
"cve": "CVE-2024-50006",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50006"
},
{
"cve": "CVE-2024-50007",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50007"
},
{
"cve": "CVE-2024-50008",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50008"
},
{
"cve": "CVE-2024-50009",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50009"
},
{
"cve": "CVE-2024-50010",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50010"
},
{
"cve": "CVE-2024-50011",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50011"
},
{
"cve": "CVE-2024-50012",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50012"
},
{
"cve": "CVE-2024-50013",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50013"
},
{
"cve": "CVE-2024-50014",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50014"
},
{
"cve": "CVE-2024-50015",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50015"
},
{
"cve": "CVE-2024-50016",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50016"
},
{
"cve": "CVE-2024-50017",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50017"
},
{
"cve": "CVE-2024-50018",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50018"
},
{
"cve": "CVE-2024-50019",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50019"
},
{
"cve": "CVE-2024-50020",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50020"
},
{
"cve": "CVE-2024-50021",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50021"
},
{
"cve": "CVE-2024-50022",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50022"
},
{
"cve": "CVE-2024-50023",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50023"
},
{
"cve": "CVE-2024-50024",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50024"
},
{
"cve": "CVE-2024-50025",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50025"
},
{
"cve": "CVE-2024-50026",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50026"
},
{
"cve": "CVE-2024-50027",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50027"
},
{
"cve": "CVE-2024-50028",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50028"
},
{
"cve": "CVE-2024-50029",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50029"
},
{
"cve": "CVE-2024-50030",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50030"
},
{
"cve": "CVE-2024-50031",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50031"
},
{
"cve": "CVE-2024-50032",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50032"
},
{
"cve": "CVE-2024-50033",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50033"
},
{
"cve": "CVE-2024-50034",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50034"
},
{
"cve": "CVE-2024-50035",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50035"
},
{
"cve": "CVE-2024-50036",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50036"
},
{
"cve": "CVE-2024-50037",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50037"
},
{
"cve": "CVE-2024-50038",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50038"
},
{
"cve": "CVE-2024-50039",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50039"
},
{
"cve": "CVE-2024-50040",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50040"
},
{
"cve": "CVE-2024-50041",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50041"
},
{
"cve": "CVE-2024-50042",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50042"
},
{
"cve": "CVE-2024-50043",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50043"
},
{
"cve": "CVE-2024-50044",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50044"
},
{
"cve": "CVE-2024-50045",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50045"
},
{
"cve": "CVE-2024-50046",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50046"
},
{
"cve": "CVE-2024-50047",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50047"
},
{
"cve": "CVE-2024-50048",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50048"
},
{
"cve": "CVE-2024-50049",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50049"
},
{
"cve": "CVE-2024-50055",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50055"
},
{
"cve": "CVE-2024-50056",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50056"
},
{
"cve": "CVE-2024-50057",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50057"
},
{
"cve": "CVE-2024-50058",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50058"
},
{
"cve": "CVE-2024-50059",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50059"
},
{
"cve": "CVE-2024-50060",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50060"
},
{
"cve": "CVE-2024-50061",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50061"
},
{
"cve": "CVE-2024-50062",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50062"
},
{
"cve": "CVE-2024-50063",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50063"
},
{
"cve": "CVE-2024-50064",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50064"
},
{
"cve": "CVE-2024-50065",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50065"
}
]
}
WID-SEC-W-2024-3251
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder andere, nicht n\u00e4her bekannte Auswirkungen zu erzielen..",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3251 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3251.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3251 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3251"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47726",
"url": "https://lore.kernel.org/linux-cve-announce/2024102104-CVE-2024-47726-ae53@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47729",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47729-8985@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47730",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47730-2f1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47731",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47731-fd73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47732",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47732-f8aa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50003",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-50003-43bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47733",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47733-6591@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47734",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47734-ad75@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47735",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47735-5d51@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50004",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50004-101e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50005",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50005-3479@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50006",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50006-fe44@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50007",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50007-0253@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50008",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50008-0152@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50009",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50009-1b62@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50010",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50010-57e8@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50011",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50011-98c9@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50012",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50012-db7d@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49863",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-49863-6a74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50013",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50013-05ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50014",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50014-d684@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50015",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50015-1eb0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50016",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50016-745a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50017",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50017-f157@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50018",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-50018-65e9@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47749",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47749-c227@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47750",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47750-390b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47751",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47751-7a96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47752",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47752-1b11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49864",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49864-5158@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49865",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49865-ae89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49866",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49866-159b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49867",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49867-b47a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49868",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49868-8dce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47753",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47753-45cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47754",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47754-a412@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49869",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49869-f804@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49870",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49870-44f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49871",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49871-1293@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49872",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49872-16d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49873",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49873-3190@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47755",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47755-2cb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47756",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47756-1c60@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47757",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47757-2b1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49874",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49874-6deb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49876",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49876-7fe2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49877",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49877-038a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49885",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49885-d5d0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49886",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49886-3477@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49887",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49887-04ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49888",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49888-027c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49889",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49889-6140@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49890",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49890-ba65@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49891",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49891-931a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49892",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49892-b04d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49893",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49893-72a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49894",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49894-08a0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49858",
"url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49858-b7c4@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49859",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49859-9917@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49860",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49860-2a48@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49861",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49861-5288@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49862",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49862-b995@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50022",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50022-0531@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50023",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50023-0e72@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50024",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50024-a052@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49955",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49955-f517@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50025",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50025-38d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50026",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50026-a7cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50027",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50027-91e1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50028",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50028-5655@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49959",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49959-ce09@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49960",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49960-f9cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49961",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49961-7541@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49962",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49962-8d16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49963",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49963-a198@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49964",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49964-e06e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50043",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50043-86f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50044",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50044-2ee1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50045",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50045-283d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50046",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50046-a9b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50047",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50047-7a27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50048",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50048-f299@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50049",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50049-26da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50055",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50055-7d1f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50056",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50056-78bf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50057",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50057-d046@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50058",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50058-e827@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50059",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50059-4ccd@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50060",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50060-6994@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49985",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49985-0b2a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49986",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49986-19eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49987",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49987-e897@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50061",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50061-50ab@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50062",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50062-1ea1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50063",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50063-1a59@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50064",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50064-33d1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50065",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50065-c751@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49988",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49988-89d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49989",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49989-8165@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49990",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49990-c3e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49991",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49991-59d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49992",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49992-fd66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49993",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49993-5b57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49994",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49994-de99@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49995",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49995-ec59@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49996",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49996-0d29@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49997",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49997-0d01@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49998",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-49998-1a69@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49999",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-49999-e815@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50000",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50000-c542@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50001",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50001-67e4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50002",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50002-bdfd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48983",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48983-7e0c@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48987",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48987-c88b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48988",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48988-188f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48989",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48989-54c3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48990",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48990-1cf1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48991",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48991-3987@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48992",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48992-2962@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49850",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2024-49850-4cc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49851",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2024-49851-edd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49852",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2024-49852-875e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49016",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49016-c7bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49017",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49017-ae90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49018",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49018-7ee3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49019",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49019-435d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49853",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49853-b3ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49854",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49854-1ba5@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49855",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49855-8997@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49020",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49020-2d32@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49021",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49021-9979@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49022",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49022-c605@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49023",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49023-381d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49024",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49024-e31a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49856",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2024-49856-f5f7@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49857",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2024-49857-7233@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49025",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49025-4bcc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49026",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49026-f8d1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49027",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49027-3006@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49028",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49028-78e7@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49029",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49029-0ffd@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49030",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49030-cee8@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49031",
"url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49031-5b75@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49032",
"url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49032-d2a1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49033",
"url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49033-a8c6@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52917",
"url": "https://lore.kernel.org/linux-cve-announce/2024102100-CVE-2023-52917-f16d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47675",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47675-643d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47722",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47722-dc6e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47723",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47723-d904@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47724",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47724-c771@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47725",
"url": "https://lore.kernel.org/linux-cve-announce/2024102104-CVE-2024-47725-f698@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47676",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47676-016b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47727",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47727-1049@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47728",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47728-824a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47677",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47677-714d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47678",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47678-0b1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47679",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47679-e793@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47680",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47680-194f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47681",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47681-bd36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47682",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47682-0582@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47683",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47683-8cf2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47684",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47684-4869@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47736",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47736-712a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47737",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47737-b77e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47738",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47738-3f0e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47685",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47685-af1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47686",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47686-e46a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47687",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47687-9a03@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47739",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47739-8bc4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47740",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47740-ae86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47688",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47688-0fe1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47689",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47689-cdec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47690",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47690-113f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47741",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47741-5974@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47742",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47742-b72d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47743",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47743-77c3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47691",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47691-ab21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47692",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47692-38d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47744",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47744-7571@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47745",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47745-42e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47746",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47746-f737@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47693",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47693-f12d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47694",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47694-5594@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47695",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47695-2d7b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47747",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47747-8dca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47748",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47748-a134@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47696",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47696-e1f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47697",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47697-5277@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47698",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47698-d5fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47699",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47699-c54c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47700",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47700-00ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47701",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47701-7db5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47702",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47702-c5c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47703",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47703-36ea@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49875",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49875-02ba@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47704",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47704-d937@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47705",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47705-12bc@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47706",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47706-7312@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49883",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49883-ca93@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49884",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49884-fa56@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47707",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47707-d8db@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47708",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47708-2b8f@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47709",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47709-8e66@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47710",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47710-3882@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47711",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47711-349d@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47712",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47712-13c2@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47713",
"url": "https://lore.kernel.org/linux-cve-announce/2024102119-CVE-2024-47713-2624@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47714",
"url": "https://lore.kernel.org/linux-cve-announce/2024102119-CVE-2024-47714-f88b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47715",
"url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47715-ff4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47716",
"url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47716-72df@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47717",
"url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47717-f7fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47718",
"url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47718-c7cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47719",
"url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47719-09a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47720",
"url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47720-c007@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47721",
"url": "https://lore.kernel.org/linux-cve-announce/2024102122-CVE-2024-47721-cb0a@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49915",
"url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49915-42ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49916",
"url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49916-3384@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49920",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49920-038d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49921",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49921-621b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49922",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49922-5435@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49923",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49923-3462@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49924",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49924-93af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49925",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49925-b469@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49926",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49926-f707@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49927",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49927-86cf@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49928",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49928-05d6@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49929",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49929-1031@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49930",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49930-34e8@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50019",
"url": "https://lore.kernel.org/linux-cve-announce/2024102126-CVE-2024-50019-5896@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50020",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50020-e41a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50021",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50021-d60d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49956",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49956-5278@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50029",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50029-8df2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49957",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49957-3302@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49958",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49958-1bc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50030",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50030-13ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50031",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50031-c158@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50032",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50032-e7ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50033",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50033-ce5e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50034",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50034-46ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49965",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49965-9ed0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49966",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49966-2893@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50035",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50035-82d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50036",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50036-9d91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50037",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50037-770e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50038",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50038-dc41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50039",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50039-41b0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50040",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50040-f156@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49967",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49967-a58a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49968",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49968-ce10@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49969",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49969-cf83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49970",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49970-a345@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49971",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49971-ad07@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50041",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50041-6118@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50042",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50042-ca9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49972",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49972-9c6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49973",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49973-8824@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49974",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49974-bda6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49975",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49975-4533@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49976",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49976-83a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49977",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49977-b657@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49978",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49978-2bff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49979",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49979-f897@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49980",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49980-da73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49981",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49981-0fb7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49982",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49982-c6b7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49983",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49983-275e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49984",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49984-e47f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48946",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2022-48946-5989@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48947",
"url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48947-0ab5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48948",
"url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48948-588a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48949",
"url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48949-a7a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48950",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48950-dc5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48951",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48951-da5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48952",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48952-a932@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48953",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48953-c6c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48954",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48954-30f2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48955",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48955-d31e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48956",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48956-75c8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48957",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48957-8250@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48958",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48958-bb88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48959",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48959-6120@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48960",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48960-c9af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48961",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48961-d44b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48962",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48962-1842@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48963",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48963-9cf2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48964",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48964-8230@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48965",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48965-0039@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48966",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48966-d8f6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48967",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48967-c2ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48968",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48968-9b4a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48969",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48969-8fe7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48970",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48970-7c96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48971",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48971-6025@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48972",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48972-4ccd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48973",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48973-a0e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48974",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48974-d2d0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48975",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48975-d7f9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48976",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48976-2980@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48977",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48977-0990@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48978",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48978-8a19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48979",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48979-d40f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48980",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48980-0fec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48981",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48981-a877@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48982",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48982-717d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48984",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48984-ea9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48985",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48985-40b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48986",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48986-cd7d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48993",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48993-8b27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48994",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48994-530f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48995",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48995-8d2e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48996",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48996-e9ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48997",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48997-cd65@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48998",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48998-1016@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48999",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-48999-c5fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49000",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49000-2c9c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49001",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49001-589c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49002",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49002-5b24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49003",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49003-482c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49004",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49004-18ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49005",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49005-c5ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49006",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49006-83c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49007",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49007-c02b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49008",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49008-d62f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49009",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49009-9bee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49010",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49010-f8e1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49011",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49011-069a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49012",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49012-8eb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49013",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49013-dd61@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49014",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49014-1627@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49015",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49015-1fd0@gregkh/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7088-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04",
"url": "https://ubuntu.com/security/notices/USN-7088-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06",
"url": "https://ubuntu.com/security/notices/USN-7088-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11",
"url": "https://ubuntu.com/security/notices/USN-7100-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12813.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7100-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12815.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7088-5"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14500-1 vom 2024-11-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7119-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4038-1 vom 2024-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7123-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5818 vom 2024-11-24",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00233.html"
},
{
"category": "external",
"summary": "Google Container-Optimized OS Release Notes vom 2024-11-18",
"url": "https://cloud.google.com/container-optimized-os/docs/release-notes#November_18_2024"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4081-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4157-1 vom 2024-12-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019904.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09",
"url": "https://linux.oracle.com/errata/ELSA-2024-12868.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09",
"url": "https://ubuntu.com/security/notices/USN-7144-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10942 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10942"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10939"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10943 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10943"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10944 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10944"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-10939.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10943 vom 2024-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-10943.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7154-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7155-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7156-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4317-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4313-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PCO2TL4OCZ4YUXTF7OMLI6WH3WKDUC2G/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17",
"url": "https://linux.oracle.com/errata/ELSA-2024-12884.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7170-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7170-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7173-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4345-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4346-1 vom 2024-12-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2FJJW5HEWYSYWAJBRWARBIZ4AQHAXLNG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7169-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7167-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7167-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7166-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11486 vom 2024-12-19",
"url": "https://access.redhat.com/errata/RHSA-2024:11486"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2024-12887.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:10944 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:10944"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-2 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7169-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-074 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4388-1 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-059 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-059.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-088 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-088.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7166-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4397-1 vom 2024-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-2 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7173-2"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4008 vom 2025-01-03",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11486 vom 2025-01-07",
"url": "https://linux.oracle.com/errata/ELSA-2024-11486.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7154-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7184-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7184-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7187-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7187-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7186-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7183-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7183-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-3 vom 2025-01-07",
"url": "https://ubuntu.com/security/notices/USN-7169-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7167-2 vom 2025-01-07",
"url": "https://ubuntu.com/security/notices/USN-7167-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-4 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7169-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7185-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7185-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7196-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7195-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7194-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7186-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-5 vom 2025-01-10",
"url": "https://ubuntu.com/security/notices/USN-7169-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0089-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0090-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020101.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0106-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14",
"url": "https://ubuntu.com/security/notices/USN-7195-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0094-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0097-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0105-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0098-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020106.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0100-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0103-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0108-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020111.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0111-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2IXCN5JTEUUWORLKQVOQYQKMHTJ73CSG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0114-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YC7MKFCHLBJHUQM2SLPOGVG4DUWP2J4E/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0112-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VKNKHAJX3LTXNPTXUJXVJL67P2P7Z7YO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0110-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PLWCG227VUGPKNXHW6FOCW727UUPVLLU/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-3 vom 2025-01-15",
"url": "https://ubuntu.com/security/notices/USN-7173-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0124-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0132-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/U2TCRAW6MN33ZU3TBEQGGYRWFSJ6BPOU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0131-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0123-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020126.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0136-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2VG6PE7ZMNWIM7E4TIKCXL4DVBGBXJN5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0137-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHBMZ4MND2ONRG4N26VJNJGAZBXMYEDV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0138-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ET3TDUWYDTZV554NRC7LB5HGM4TCIIGZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0146-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C6ANXHEO54VUUFEWI6QYB2M3L2SS7OOW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0172-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020164.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0177-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020162.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0164-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0185-1 vom 2025-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020171.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0180-1 vom 2025-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020174.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0181-1 vom 2025-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-079 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-079.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-078 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0240-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCBYAV5OJRXD362FDCZUSIHNHOURONCF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0239-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBKJOKHJGUZRHPVCGSRZVBF6ZMI7KJY7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0238-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNU4IXTEAXCI7QNPC2AVXZICYTGC4XXI/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-090 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-061 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-061.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0249-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0253-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0246-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0245-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0244-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0254-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020213.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0260-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0264-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0243-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20066 vom 2025-01-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-20066.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7237-1 vom 2025-01-28",
"url": "https://ubuntu.com/security/notices/USN-7237-1"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14705-1 vom 2025-01-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-198 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-198.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-196 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-196.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-092 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-092.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-195 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-195.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-197 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-197.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2745 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2745.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1957 vom 2025-02-05",
"url": "https://alas.aws.amazon.com/ALAS-2025-1957.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5860 vom 2025-02-08",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00023.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20095 vom 2025-02-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20095.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0410-1 vom 2025-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0428-1 vom 2025-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0426-1 vom 2025-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020303.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0440-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020319.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20100 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0462-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CNVHBWUSJZEY34QR6GDPRY55WG3UIDSL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0476-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VFHWMM4XIDZD22QFLM3OSRWWSFFBUTZM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0494-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6OLOLTOPB2LMYQP5ZEWFA5S443WHFDIQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0486-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XWFV7VUE5TX6GKXVI46R6ZIDRFEXHKUZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0489-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OCZ53J3OQFQB3VZIF7V6BL32FWNAV3CH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0462-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNVHBWUSJZEY34QR6GDPRY55WG3UIDSL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0449-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020322.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0494-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6OLOLTOPB2LMYQP5ZEWFA5S443WHFDIQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0487-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QIBJK3XANPM2U6AEOTGJ27N3L472DCRE/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0455-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020321.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0452-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020320.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0465-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IZBNMZ4JWAINQUJYDC5JJYGAKWUST46Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0499-1 vom 2025-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0557-1 vom 2025-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0564-1 vom 2025-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1960 vom 2025-02-19",
"url": "https://alas.aws.amazon.com/ALAS-2025-1960.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7276-1 vom 2025-02-19",
"url": "https://ubuntu.com/security/notices/USN-7276-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7277-1 vom 2025-02-19",
"url": "https://ubuntu.com/security/notices/USN-7277-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24",
"url": "https://ubuntu.com/security/notices/USN-7288-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-1 vom 2025-02-24",
"url": "https://ubuntu.com/security/notices/USN-7289-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7291-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7291-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7288-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7293-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7293-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7184085 vom 2025-02-25",
"url": "https://www.ibm.com/support/pages/node/7184085"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-2 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7289-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7289-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7295-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2759 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2759.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7294-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-094 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-094.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-063 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-063.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7301-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7301-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7294-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7289-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7308-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7294-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7303-2 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7303-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7310-1 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7310-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7311-1 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7311-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4075 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4076 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03",
"url": "https://ubuntu.com/security/notices/USN-7294-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7303-3 vom 2025-03-03",
"url": "https://ubuntu.com/security/notices/USN-7303-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2270 vom 2025-03-05",
"url": "https://access.redhat.com/errata/RHSA-2025:2270"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1912 vom 2025-03-05",
"url": "https://access.redhat.com/errata/RHSA-2025:1912"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7333-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7333-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7332-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0784-1 vom 2025-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7331-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7331-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-203 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-203.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-204 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-204.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-205 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-205.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-202 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-202.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1961 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/ALAS-2025-1961.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2775 vom 2025-03-07",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2775.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20152 vom 2025-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20152.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185244 vom 2025-03-10",
"url": "https://www.ibm.com/support/pages/node/7185244"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7344-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7342-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7342-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-2 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7332-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-3 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7332-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-2 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7344-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-082 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-082.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-083 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-083.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1966 vom 2025-03-17",
"url": "https://alas.aws.amazon.com/ALAS-2025-1966.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20190 vom 2025-03-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-20190.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2800 vom 2025-03-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2800.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7388-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7386-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7386-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7387-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7385-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7385-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7383-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7383-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7384-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7384-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7383-2 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7383-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7391-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7389-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7393-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7390-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4102 vom 2025-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7384-2 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7384-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7401-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7403-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7403-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1114-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GFUVKSUXYRNYGI6ZX3V2THDXSA47UNT/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7407-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1121-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/N43CHCB2GP64EHTUHJOPVKKKNZQRWP2Y/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1119-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SBLYTUS3TCCWSW237VUH6AAY5NVYUZ3T/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1139-1 vom 2025-04-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MMCQJLNQTFQY3ASC2RY677DDWALMOJCQ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7413-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1123-1 vom 2025-04-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RBJNUDBE6VPHIDCFIVWE7AFUQ2E2P436/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7421-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7428-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7428-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7428-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7428-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1225-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMQIDOZZ3LRBGKAI3UWUKDCXNJWRXYGY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1213-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/64D5YFJLDESGQOR3OGPOEV5S4M3DYYAU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1231-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020693.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20271 vom 2025-04-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-20271.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1236-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020691.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1254-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020695.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1248-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020697.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1259-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020698.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1260-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5C772I5KLAAUMXFCSPXGHE5ETFPZGIIY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1278-1 vom 2025-04-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020701.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1262-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YQ5OGGLUK4JYNQDMHQJCE7NAM5KWAUQ6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2826 vom 2025-04-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2826.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1970 vom 2025-04-17",
"url": "https://alas.aws.amazon.com/ALAS-2025-1970.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7451-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7453-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7452-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7449-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7450-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7449-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7459-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7463-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7461-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7461-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7458-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5907 vom 2025-04-27",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00069.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7459-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7468-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-227 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-227.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-224 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-224.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-100 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-100.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-226 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-226.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-225 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-225.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-228 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-228.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html"
},
{
"category": "external",
"summary": "Kyocera Downloads",
"url": "https://www.kyoceradocumentsolutions.us/en/support/downloads.name-L3VzL2VuL3NvZnR3YXJlL0tZT0NFUkFERVZJQ0VNQU5BR0VS.html#tab=application"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-3 vom 2025-05-02",
"url": "https://ubuntu.com/security/notices/USN-7461-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4509 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4509"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13",
"url": "https://ubuntu.com/security/notices/USN-7506-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7532 vom 2025-05-14",
"url": "https://access.redhat.com/errata/RHSA-2025:7532"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:6966"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7531 vom 2025-05-14",
"url": "https://access.redhat.com/errata/RHSA-2025:7531"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7676 vom 2025-05-15",
"url": "https://access.redhat.com/errata/RHSA-2025:7676"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7683 vom 2025-05-16",
"url": "https://access.redhat.com/errata/RHSA-2025:7683"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7516-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7514-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7531 vom 2025-05-17",
"url": "http://linux.oracle.com/errata/ELSA-2025-7531.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7515-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7512-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7517-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7518-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7522-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7515-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7516-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7511-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7523-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7517-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7516-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
"url": "https://ubuntu.com/security/notices/USN-7516-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7524-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7517-3"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7516-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
"url": "https://ubuntu.com/security/notices/USN-7510-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7510-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7510-8"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-9"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-7"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20285-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20191-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06",
"url": "https://ubuntu.com/security/notices/USN-7553-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-6"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01840-1 vom 2025-06-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021434.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01853-1 vom 2025-06-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021441.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01869-1 vom 2025-06-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021449.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01873-1 vom 2025-06-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021451.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20372 vom 2025-06-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-20372.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20386-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021483.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20388-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021481.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20384-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021485.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01930-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021497.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20381-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021488.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01932-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021501.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20400-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021522.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250613-0011 vom 2025-06-13",
"url": "https://security.netapp.com/advisory/NTAP-20250613-0011"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20397-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021525.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-095 vom 2025-06-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-095.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250627-0002 vom 2025-06-27",
"url": "https://security.netapp.com/advisory/NTAP-20250627-0002"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250627-0005 vom 2025-06-27",
"url": "https://security.netapp.com/advisory/NTAP-20250627-0005"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01",
"url": "https://ubuntu.com/security/notices/USN-7607-1"
},
{
"category": "external",
"summary": "SEM 2025.2.1 release notes vom 2025-07-02",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-3 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7608-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-2 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7608-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-1 vom 2025-07-01",
"url": "https://ubuntu.com/security/notices/USN-7608-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7607-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-4 vom 2025-07-03",
"url": "https://ubuntu.com/security/notices/USN-7608-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7627-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-5 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7608-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08",
"url": "https://ubuntu.com/security/notices/USN-7627-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7607-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0113-1 vom 2025-07-10",
"url": "https://ubuntu.com/security/notices/LSN-0113-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-6 vom 2025-07-11",
"url": "https://ubuntu.com/security/notices/USN-7608-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7640-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7653-1 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7653-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-1 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7651-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7652-1 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7652-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-2 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7651-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7655-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-3 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7651-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7654-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-4 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7651-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-5 vom 2025-07-24",
"url": "https://ubuntu.com/security/notices/USN-7651-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-6 vom 2025-07-24",
"url": "https://ubuntu.com/security/notices/USN-7651-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25",
"url": "https://ubuntu.com/security/notices/USN-7671-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7671-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7654-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-7 vom 2025-07-30",
"url": "https://ubuntu.com/security/notices/USN-7608-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-2 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-1 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-3 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-3"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-100 vom 2025-08-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-100.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-105 vom 2025-08-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-105.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04",
"url": "https://ubuntu.com/security/notices/USN-7671-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7686-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-101 vom 2025-08-09",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-101.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-106 vom 2025-08-09",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-106.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13",
"url": "https://ubuntu.com/security/notices/USN-7685-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-1 vom 2025-08-19",
"url": "https://ubuntu.com/security/notices/USN-7701-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-2 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7701-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-3 vom 2025-08-21",
"url": "https://ubuntu.com/security/notices/USN-7701-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7712-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7711-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7727-1 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7727-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7727-2 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7727-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7712-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7727-3 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7727-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03",
"url": "https://ubuntu.com/security/notices/USN-7737-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15008 vom 2025-09-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-15008.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03097-1 vom 2025-09-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022420.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03108-1 vom 2025-09-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022413.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJXQ5TFHHXOY34RCSJPZ32PXICETJJAT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03130-1 vom 2025-09-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OI7XTGACEWQ2UDCZMU7BMJ53EJTK4DLT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03135-1 vom 2025-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022453.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03156-1 vom 2025-09-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSLXEYDHEPXZRRM6QVD2CNPFQE4HV4IH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03175-1 vom 2025-09-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022497.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03181-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022513.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03186-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022508.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03191-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022516.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03190-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022518.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03209-1 vom 2025-09-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYKN5NGIGIUIQOD7ME5J7EMEHPSJ3AGG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03223-1 vom 2025-09-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022534.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03226-1 vom 2025-09-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEHWYIR3R7GHFMEAF5GZVX6OYPVERDIJ/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-089 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-089.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7755-1 vom 2025-09-17",
"url": "https://ubuntu.com/security/notices/USN-7755-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20714-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022558.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7755-2 vom 2025-09-17",
"url": "https://ubuntu.com/security/notices/USN-7755-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20711-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022561.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20703-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022569.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20698-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022573.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03272-1 vom 2025-09-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022589.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03290-1 vom 2025-09-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022602.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6009 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2025-09-22T22:00:00.000+00:00",
"generator": {
"date": "2025-09-23T05:02:10.420+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-3251",
"initial_release_date": "2024-10-21T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-21T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-17T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-24T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-11-25T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-28T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-02T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-09T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-12T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2024-12-22T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-01-02T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-01-07T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-01-15T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-01-16T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-19T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-20T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2025-01-27T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-28T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2025-02-03T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-04T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-05T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-09T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-02-10T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-11T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-17T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-19T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-24T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-02-27T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-03T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-04T23:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-05T23:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-03-06T23:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Oracle Linux und IBM aufgenommen"
},
{
"date": "2025-03-11T23:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-03-13T23:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-19T23:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-20T23:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-03-25T23:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-04-07T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-14T22:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-16T22:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-21T22:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-23T22:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-27T22:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-28T22:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-05T22:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-15T22:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von Ubuntu, SUSE und Debian aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von Ubuntu, Debian und Amazon aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-05T22:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "110",
"summary": "Neue Updates von Ubuntu, Amazon und SUSE aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "111",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "112",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-06-12T22:00:00.000+00:00",
"number": "113",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "114",
"summary": "Neue Updates von SUSE und NetApp aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "115",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "116",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "117",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "118",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "119",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "120",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "121",
"summary": "Neue Updates von Oracle Linux, Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "122",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-13T22:00:00.000+00:00",
"number": "123",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "124",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "125",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "126",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "127",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "128",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "129",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-23T22:00:00.000+00:00",
"number": "130",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-24T22:00:00.000+00:00",
"number": "131",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "132",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "133",
"summary": "Referenz(en) aufgenommen: EUVD-2025-22875"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "134",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "135",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "136",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "137",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "138",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-10T22:00:00.000+00:00",
"number": "139",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "140",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "141",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "142",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-20T22:00:00.000+00:00",
"number": "143",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "144",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "145",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "146",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "147",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "148",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "149",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "150",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-09-10T22:00:00.000+00:00",
"number": "151",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-11T22:00:00.000+00:00",
"number": "152",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "153",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "154",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "155",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-09-17T22:00:00.000+00:00",
"number": "156",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-09-18T22:00:00.000+00:00",
"number": "157",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "158",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
}
],
"status": "final",
"version": "158"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T034583",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11 IF02",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF02",
"product_id": "T041397"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11 IF02",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11 IF02",
"product_id": "T041397-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if02"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Kyocera Printer",
"product": {
"name": "Kyocera Printer",
"product_id": "T015471",
"product_identification_helper": {
"cpe": "cpe:/h:kyocera:printer:-"
}
}
}
],
"category": "vendor",
"name": "Kyocera"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Baseboard Management Controller",
"product": {
"name": "NetApp AFF Baseboard Management Controller",
"product_id": "T025086",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:aff:::baseboard_management_controller"
}
}
}
],
"category": "product_name",
"name": "AFF"
},
{
"branches": [
{
"category": "product_version",
"name": "for VMware vSphere",
"product": {
"name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
"product_id": "T025152",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
}
}
}
],
"category": "product_name",
"name": "ActiveIQ Unified Manager"
},
{
"branches": [
{
"category": "product_version",
"name": "Baseboard Management Controller",
"product": {
"name": "NetApp FAS Baseboard Management Controller",
"product_id": "T043535",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:baseboard_management_controller"
}
}
}
],
"category": "product_name",
"name": "FAS"
},
{
"category": "product_name",
"name": "NetApp StorageGRID",
"product": {
"name": "NetApp StorageGRID",
"product_id": "920206",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:storagegrid:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T046484",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T042774",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T042775",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager \u003c2025.2.1",
"product_id": "T044986"
}
},
{
"category": "product_version",
"name": "2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager 2025.2.1",
"product_id": "T044986-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10044",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2016-10044"
},
{
"cve": "CVE-2022-48946",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48946"
},
{
"cve": "CVE-2022-48947",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48947"
},
{
"cve": "CVE-2022-48948",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48948"
},
{
"cve": "CVE-2022-48949",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48949"
},
{
"cve": "CVE-2022-48950",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48950"
},
{
"cve": "CVE-2022-48951",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48951"
},
{
"cve": "CVE-2022-48952",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48952"
},
{
"cve": "CVE-2022-48953",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48953"
},
{
"cve": "CVE-2022-48954",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48954"
},
{
"cve": "CVE-2022-48955",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48955"
},
{
"cve": "CVE-2022-48956",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48956"
},
{
"cve": "CVE-2022-48957",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48957"
},
{
"cve": "CVE-2022-48958",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48958"
},
{
"cve": "CVE-2022-48959",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48959"
},
{
"cve": "CVE-2022-48960",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48960"
},
{
"cve": "CVE-2022-48961",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48961"
},
{
"cve": "CVE-2022-48962",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48962"
},
{
"cve": "CVE-2022-48963",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48963"
},
{
"cve": "CVE-2022-48964",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48964"
},
{
"cve": "CVE-2022-48965",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48965"
},
{
"cve": "CVE-2022-48966",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48966"
},
{
"cve": "CVE-2022-48967",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48967"
},
{
"cve": "CVE-2022-48968",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48968"
},
{
"cve": "CVE-2022-48969",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48969"
},
{
"cve": "CVE-2022-48970",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48970"
},
{
"cve": "CVE-2022-48971",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48971"
},
{
"cve": "CVE-2022-48972",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48972"
},
{
"cve": "CVE-2022-48973",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48973"
},
{
"cve": "CVE-2022-48974",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48974"
},
{
"cve": "CVE-2022-48975",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48975"
},
{
"cve": "CVE-2022-48976",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48976"
},
{
"cve": "CVE-2022-48977",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48977"
},
{
"cve": "CVE-2022-48978",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48978"
},
{
"cve": "CVE-2022-48979",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48979"
},
{
"cve": "CVE-2022-48980",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48980"
},
{
"cve": "CVE-2022-48981",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48981"
},
{
"cve": "CVE-2022-48982",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48982"
},
{
"cve": "CVE-2022-48983",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48983"
},
{
"cve": "CVE-2022-48984",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48984"
},
{
"cve": "CVE-2022-48985",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48985"
},
{
"cve": "CVE-2022-48986",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48986"
},
{
"cve": "CVE-2022-48987",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48987"
},
{
"cve": "CVE-2022-48988",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48988"
},
{
"cve": "CVE-2022-48989",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48989"
},
{
"cve": "CVE-2022-48990",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48990"
},
{
"cve": "CVE-2022-48991",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48991"
},
{
"cve": "CVE-2022-48992",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48992"
},
{
"cve": "CVE-2022-48993",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48993"
},
{
"cve": "CVE-2022-48994",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48994"
},
{
"cve": "CVE-2022-48995",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48995"
},
{
"cve": "CVE-2022-48996",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48996"
},
{
"cve": "CVE-2022-48997",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48997"
},
{
"cve": "CVE-2022-48998",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48998"
},
{
"cve": "CVE-2022-48999",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48999"
},
{
"cve": "CVE-2022-49000",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49000"
},
{
"cve": "CVE-2022-49001",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49001"
},
{
"cve": "CVE-2022-49002",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49002"
},
{
"cve": "CVE-2022-49003",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49003"
},
{
"cve": "CVE-2022-49004",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49004"
},
{
"cve": "CVE-2022-49005",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49005"
},
{
"cve": "CVE-2022-49006",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49006"
},
{
"cve": "CVE-2022-49007",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49007"
},
{
"cve": "CVE-2022-49008",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49008"
},
{
"cve": "CVE-2022-49009",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49009"
},
{
"cve": "CVE-2022-49010",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49010"
},
{
"cve": "CVE-2022-49011",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49011"
},
{
"cve": "CVE-2022-49012",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49012"
},
{
"cve": "CVE-2022-49013",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49013"
},
{
"cve": "CVE-2022-49014",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49014"
},
{
"cve": "CVE-2022-49015",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49015"
},
{
"cve": "CVE-2022-49016",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49016"
},
{
"cve": "CVE-2022-49017",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49017"
},
{
"cve": "CVE-2022-49018",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49018"
},
{
"cve": "CVE-2022-49019",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49019"
},
{
"cve": "CVE-2022-49020",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49020"
},
{
"cve": "CVE-2022-49021",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49021"
},
{
"cve": "CVE-2022-49022",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49022"
},
{
"cve": "CVE-2022-49023",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49023"
},
{
"cve": "CVE-2022-49024",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49024"
},
{
"cve": "CVE-2022-49025",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49025"
},
{
"cve": "CVE-2022-49026",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49026"
},
{
"cve": "CVE-2022-49027",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49027"
},
{
"cve": "CVE-2022-49028",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49028"
},
{
"cve": "CVE-2022-49029",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49029"
},
{
"cve": "CVE-2022-49030",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49030"
},
{
"cve": "CVE-2022-49031",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49031"
},
{
"cve": "CVE-2022-49032",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49032"
},
{
"cve": "CVE-2022-49033",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49033"
},
{
"cve": "CVE-2023-52917",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-52917"
},
{
"cve": "CVE-2023-52918",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-52918"
},
{
"cve": "CVE-2023-52919",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-52919"
},
{
"cve": "CVE-2023-6270",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-6270"
},
{
"cve": "CVE-2024-47675",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47675"
},
{
"cve": "CVE-2024-47676",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47676"
},
{
"cve": "CVE-2024-47677",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47677"
},
{
"cve": "CVE-2024-47678",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47678"
},
{
"cve": "CVE-2024-47679",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47679"
},
{
"cve": "CVE-2024-47680",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47680"
},
{
"cve": "CVE-2024-47681",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47681"
},
{
"cve": "CVE-2024-47682",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47682"
},
{
"cve": "CVE-2024-47683",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47683"
},
{
"cve": "CVE-2024-47684",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47684"
},
{
"cve": "CVE-2024-47685",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47685"
},
{
"cve": "CVE-2024-47686",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47686"
},
{
"cve": "CVE-2024-47687",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47687"
},
{
"cve": "CVE-2024-47688",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47688"
},
{
"cve": "CVE-2024-47689",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47689"
},
{
"cve": "CVE-2024-47690",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47690"
},
{
"cve": "CVE-2024-47691",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47691"
},
{
"cve": "CVE-2024-47692",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47692"
},
{
"cve": "CVE-2024-47693",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47693"
},
{
"cve": "CVE-2024-47694",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47694"
},
{
"cve": "CVE-2024-47695",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47695"
},
{
"cve": "CVE-2024-47696",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47696"
},
{
"cve": "CVE-2024-47697",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47697"
},
{
"cve": "CVE-2024-47698",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47698"
},
{
"cve": "CVE-2024-47699",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47699"
},
{
"cve": "CVE-2024-47700",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47700"
},
{
"cve": "CVE-2024-47701",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47701"
},
{
"cve": "CVE-2024-47702",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47702"
},
{
"cve": "CVE-2024-47703",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47703"
},
{
"cve": "CVE-2024-47704",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47704"
},
{
"cve": "CVE-2024-47705",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47705"
},
{
"cve": "CVE-2024-47706",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47706"
},
{
"cve": "CVE-2024-47707",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47707"
},
{
"cve": "CVE-2024-47708",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47708"
},
{
"cve": "CVE-2024-47709",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47709"
},
{
"cve": "CVE-2024-47710",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47710"
},
{
"cve": "CVE-2024-47711",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47711"
},
{
"cve": "CVE-2024-47712",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47712"
},
{
"cve": "CVE-2024-47713",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47713"
},
{
"cve": "CVE-2024-47714",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47714"
},
{
"cve": "CVE-2024-47715",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47715"
},
{
"cve": "CVE-2024-47716",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47716"
},
{
"cve": "CVE-2024-47717",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47717"
},
{
"cve": "CVE-2024-47718",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47718"
},
{
"cve": "CVE-2024-47719",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47719"
},
{
"cve": "CVE-2024-47720",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47720"
},
{
"cve": "CVE-2024-47721",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47721"
},
{
"cve": "CVE-2024-47722",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47722"
},
{
"cve": "CVE-2024-47723",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47723"
},
{
"cve": "CVE-2024-47724",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47724"
},
{
"cve": "CVE-2024-47725",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47725"
},
{
"cve": "CVE-2024-47726",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47726"
},
{
"cve": "CVE-2024-47727",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47727"
},
{
"cve": "CVE-2024-47728",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47728"
},
{
"cve": "CVE-2024-47729",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47729"
},
{
"cve": "CVE-2024-47730",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47730"
},
{
"cve": "CVE-2024-47731",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47731"
},
{
"cve": "CVE-2024-47732",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47732"
},
{
"cve": "CVE-2024-47733",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47733"
},
{
"cve": "CVE-2024-47734",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47734"
},
{
"cve": "CVE-2024-47735",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47735"
},
{
"cve": "CVE-2024-47736",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47736"
},
{
"cve": "CVE-2024-47737",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47737"
},
{
"cve": "CVE-2024-47738",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47738"
},
{
"cve": "CVE-2024-47739",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47739"
},
{
"cve": "CVE-2024-47740",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47740"
},
{
"cve": "CVE-2024-47741",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47741"
},
{
"cve": "CVE-2024-47742",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47742"
},
{
"cve": "CVE-2024-47743",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47743"
},
{
"cve": "CVE-2024-47744",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47744"
},
{
"cve": "CVE-2024-47745",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47745"
},
{
"cve": "CVE-2024-47746",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47746"
},
{
"cve": "CVE-2024-47747",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47747"
},
{
"cve": "CVE-2024-47748",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47748"
},
{
"cve": "CVE-2024-47749",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47749"
},
{
"cve": "CVE-2024-47750",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47750"
},
{
"cve": "CVE-2024-47751",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47751"
},
{
"cve": "CVE-2024-47752",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47752"
},
{
"cve": "CVE-2024-47753",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47753"
},
{
"cve": "CVE-2024-47754",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47754"
},
{
"cve": "CVE-2024-47755",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47755"
},
{
"cve": "CVE-2024-47756",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47756"
},
{
"cve": "CVE-2024-47757",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47757"
},
{
"cve": "CVE-2024-49850",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49850"
},
{
"cve": "CVE-2024-49851",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49851"
},
{
"cve": "CVE-2024-49852",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49852"
},
{
"cve": "CVE-2024-49853",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49853"
},
{
"cve": "CVE-2024-49854",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49854"
},
{
"cve": "CVE-2024-49855",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49855"
},
{
"cve": "CVE-2024-49856",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49856"
},
{
"cve": "CVE-2024-49857",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49857"
},
{
"cve": "CVE-2024-49858",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49858"
},
{
"cve": "CVE-2024-49859",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49859"
},
{
"cve": "CVE-2024-49860",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49860"
},
{
"cve": "CVE-2024-49861",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49861"
},
{
"cve": "CVE-2024-49862",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49862"
},
{
"cve": "CVE-2024-49863",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49863"
},
{
"cve": "CVE-2024-49864",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49864"
},
{
"cve": "CVE-2024-49865",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49865"
},
{
"cve": "CVE-2024-49866",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49866"
},
{
"cve": "CVE-2024-49867",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49867"
},
{
"cve": "CVE-2024-49868",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49868"
},
{
"cve": "CVE-2024-49869",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49869"
},
{
"cve": "CVE-2024-49870",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49870"
},
{
"cve": "CVE-2024-49871",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49871"
},
{
"cve": "CVE-2024-49872",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49872"
},
{
"cve": "CVE-2024-49873",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49873"
},
{
"cve": "CVE-2024-49874",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49874"
},
{
"cve": "CVE-2024-49875",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49875"
},
{
"cve": "CVE-2024-49876",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49876"
},
{
"cve": "CVE-2024-49877",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49877"
},
{
"cve": "CVE-2024-49878",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49878"
},
{
"cve": "CVE-2024-49879",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49879"
},
{
"cve": "CVE-2024-49880",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49880"
},
{
"cve": "CVE-2024-49881",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49881"
},
{
"cve": "CVE-2024-49882",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49882"
},
{
"cve": "CVE-2024-49883",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49883"
},
{
"cve": "CVE-2024-49884",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49884"
},
{
"cve": "CVE-2024-49885",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49885"
},
{
"cve": "CVE-2024-49886",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49886"
},
{
"cve": "CVE-2024-49887",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49887"
},
{
"cve": "CVE-2024-49888",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49888"
},
{
"cve": "CVE-2024-49889",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49889"
},
{
"cve": "CVE-2024-49890",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49890"
},
{
"cve": "CVE-2024-49891",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49891"
},
{
"cve": "CVE-2024-49892",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49892"
},
{
"cve": "CVE-2024-49893",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49893"
},
{
"cve": "CVE-2024-49894",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49894"
},
{
"cve": "CVE-2024-49895",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49895"
},
{
"cve": "CVE-2024-49896",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49896"
},
{
"cve": "CVE-2024-49897",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49897"
},
{
"cve": "CVE-2024-49898",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49898"
},
{
"cve": "CVE-2024-49899",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49899"
},
{
"cve": "CVE-2024-49900",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49900"
},
{
"cve": "CVE-2024-49901",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49901"
},
{
"cve": "CVE-2024-49902",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49902"
},
{
"cve": "CVE-2024-49903",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49903"
},
{
"cve": "CVE-2024-49905",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49905"
},
{
"cve": "CVE-2024-49906",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49906"
},
{
"cve": "CVE-2024-49907",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49907"
},
{
"cve": "CVE-2024-49908",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49908"
},
{
"cve": "CVE-2024-49909",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49909"
},
{
"cve": "CVE-2024-49911",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49911"
},
{
"cve": "CVE-2024-49912",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49912"
},
{
"cve": "CVE-2024-49913",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49913"
},
{
"cve": "CVE-2024-49914",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49914"
},
{
"cve": "CVE-2024-49915",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49915"
},
{
"cve": "CVE-2024-49916",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49916"
},
{
"cve": "CVE-2024-49917",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49917"
},
{
"cve": "CVE-2024-49918",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49918"
},
{
"cve": "CVE-2024-49919",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49919"
},
{
"cve": "CVE-2024-49920",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49920"
},
{
"cve": "CVE-2024-49921",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49921"
},
{
"cve": "CVE-2024-49922",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49922"
},
{
"cve": "CVE-2024-49923",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49923"
},
{
"cve": "CVE-2024-49924",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49924"
},
{
"cve": "CVE-2024-49925",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49925"
},
{
"cve": "CVE-2024-49926",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49926"
},
{
"cve": "CVE-2024-49927",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49927"
},
{
"cve": "CVE-2024-49928",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49928"
},
{
"cve": "CVE-2024-49929",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49929"
},
{
"cve": "CVE-2024-49930",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49930"
},
{
"cve": "CVE-2024-49931",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49931"
},
{
"cve": "CVE-2024-49932",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49932"
},
{
"cve": "CVE-2024-49933",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49933"
},
{
"cve": "CVE-2024-49934",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49934"
},
{
"cve": "CVE-2024-49935",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49935"
},
{
"cve": "CVE-2024-49936",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49936"
},
{
"cve": "CVE-2024-49937",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49937"
},
{
"cve": "CVE-2024-49938",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49938"
},
{
"cve": "CVE-2024-49939",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49939"
},
{
"cve": "CVE-2024-49940",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49940"
},
{
"cve": "CVE-2024-49941",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49941"
},
{
"cve": "CVE-2024-49942",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49942"
},
{
"cve": "CVE-2024-49943",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49943"
},
{
"cve": "CVE-2024-49944",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49944"
},
{
"cve": "CVE-2024-49945",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49945"
},
{
"cve": "CVE-2024-49946",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49946"
},
{
"cve": "CVE-2024-49947",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49947"
},
{
"cve": "CVE-2024-49948",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49948"
},
{
"cve": "CVE-2024-49949",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49949"
},
{
"cve": "CVE-2024-49950",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49950"
},
{
"cve": "CVE-2024-49951",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49951"
},
{
"cve": "CVE-2024-49952",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49952"
},
{
"cve": "CVE-2024-49953",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49953"
},
{
"cve": "CVE-2024-49954",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49954"
},
{
"cve": "CVE-2024-49955",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49955"
},
{
"cve": "CVE-2024-49956",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49956"
},
{
"cve": "CVE-2024-49957",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49957"
},
{
"cve": "CVE-2024-49958",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49958"
},
{
"cve": "CVE-2024-49959",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49959"
},
{
"cve": "CVE-2024-49960",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49960"
},
{
"cve": "CVE-2024-49961",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49961"
},
{
"cve": "CVE-2024-49962",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49962"
},
{
"cve": "CVE-2024-49963",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49963"
},
{
"cve": "CVE-2024-49964",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49964"
},
{
"cve": "CVE-2024-49965",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49965"
},
{
"cve": "CVE-2024-49966",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49966"
},
{
"cve": "CVE-2024-49967",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49967"
},
{
"cve": "CVE-2024-49968",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49968"
},
{
"cve": "CVE-2024-49969",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49969"
},
{
"cve": "CVE-2024-49970",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49970"
},
{
"cve": "CVE-2024-49971",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49971"
},
{
"cve": "CVE-2024-49972",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49972"
},
{
"cve": "CVE-2024-49973",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49973"
},
{
"cve": "CVE-2024-49974",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49974"
},
{
"cve": "CVE-2024-49975",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49975"
},
{
"cve": "CVE-2024-49976",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49976"
},
{
"cve": "CVE-2024-49977",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49977"
},
{
"cve": "CVE-2024-49978",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49978"
},
{
"cve": "CVE-2024-49979",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49979"
},
{
"cve": "CVE-2024-49980",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49980"
},
{
"cve": "CVE-2024-49981",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49981"
},
{
"cve": "CVE-2024-49982",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49982"
},
{
"cve": "CVE-2024-49983",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49983"
},
{
"cve": "CVE-2024-49984",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49984"
},
{
"cve": "CVE-2024-49985",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49985"
},
{
"cve": "CVE-2024-49986",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49986"
},
{
"cve": "CVE-2024-49987",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49987"
},
{
"cve": "CVE-2024-49988",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49988"
},
{
"cve": "CVE-2024-49989",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49989"
},
{
"cve": "CVE-2024-49990",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49990"
},
{
"cve": "CVE-2024-49991",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49991"
},
{
"cve": "CVE-2024-49992",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49992"
},
{
"cve": "CVE-2024-49993",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49993"
},
{
"cve": "CVE-2024-49994",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49994"
},
{
"cve": "CVE-2024-49995",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49995"
},
{
"cve": "CVE-2024-49996",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49996"
},
{
"cve": "CVE-2024-49997",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49997"
},
{
"cve": "CVE-2024-49998",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49998"
},
{
"cve": "CVE-2024-49999",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49999"
},
{
"cve": "CVE-2024-50000",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50000"
},
{
"cve": "CVE-2024-50001",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50001"
},
{
"cve": "CVE-2024-50002",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50002"
},
{
"cve": "CVE-2024-50003",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50003"
},
{
"cve": "CVE-2024-50004",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50004"
},
{
"cve": "CVE-2024-50005",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50005"
},
{
"cve": "CVE-2024-50006",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50006"
},
{
"cve": "CVE-2024-50007",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50007"
},
{
"cve": "CVE-2024-50008",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50008"
},
{
"cve": "CVE-2024-50009",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50009"
},
{
"cve": "CVE-2024-50010",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50010"
},
{
"cve": "CVE-2024-50011",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50011"
},
{
"cve": "CVE-2024-50012",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50012"
},
{
"cve": "CVE-2024-50013",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50013"
},
{
"cve": "CVE-2024-50014",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50014"
},
{
"cve": "CVE-2024-50015",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50015"
},
{
"cve": "CVE-2024-50016",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50016"
},
{
"cve": "CVE-2024-50017",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50017"
},
{
"cve": "CVE-2024-50018",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50018"
},
{
"cve": "CVE-2024-50019",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50019"
},
{
"cve": "CVE-2024-50020",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50020"
},
{
"cve": "CVE-2024-50021",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50021"
},
{
"cve": "CVE-2024-50022",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50022"
},
{
"cve": "CVE-2024-50023",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50023"
},
{
"cve": "CVE-2024-50024",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50024"
},
{
"cve": "CVE-2024-50025",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50025"
},
{
"cve": "CVE-2024-50026",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50026"
},
{
"cve": "CVE-2024-50027",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50027"
},
{
"cve": "CVE-2024-50028",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50028"
},
{
"cve": "CVE-2024-50029",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50029"
},
{
"cve": "CVE-2024-50030",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50030"
},
{
"cve": "CVE-2024-50031",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50031"
},
{
"cve": "CVE-2024-50032",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50032"
},
{
"cve": "CVE-2024-50033",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50033"
},
{
"cve": "CVE-2024-50034",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50034"
},
{
"cve": "CVE-2024-50035",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50035"
},
{
"cve": "CVE-2024-50036",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50036"
},
{
"cve": "CVE-2024-50037",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50037"
},
{
"cve": "CVE-2024-50038",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50038"
},
{
"cve": "CVE-2024-50039",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50039"
},
{
"cve": "CVE-2024-50040",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50040"
},
{
"cve": "CVE-2024-50041",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50041"
},
{
"cve": "CVE-2024-50042",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50042"
},
{
"cve": "CVE-2024-50043",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50043"
},
{
"cve": "CVE-2024-50044",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50044"
},
{
"cve": "CVE-2024-50045",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50045"
},
{
"cve": "CVE-2024-50046",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50046"
},
{
"cve": "CVE-2024-50047",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50047"
},
{
"cve": "CVE-2024-50048",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50048"
},
{
"cve": "CVE-2024-50049",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50049"
},
{
"cve": "CVE-2024-50055",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50055"
},
{
"cve": "CVE-2024-50056",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50056"
},
{
"cve": "CVE-2024-50057",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50057"
},
{
"cve": "CVE-2024-50058",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50058"
},
{
"cve": "CVE-2024-50059",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50059"
},
{
"cve": "CVE-2024-50060",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50060"
},
{
"cve": "CVE-2024-50061",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50061"
},
{
"cve": "CVE-2024-50062",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50062"
},
{
"cve": "CVE-2024-50063",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50063"
},
{
"cve": "CVE-2024-50064",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50064"
},
{
"cve": "CVE-2024-50065",
"product_status": {
"known_affected": [
"T025086",
"T025152",
"67646",
"T034583",
"T004914",
"T032255",
"T039664",
"T015471",
"T042774",
"T044986",
"T042775",
"2951",
"T002207",
"T043535",
"T000126",
"T031092",
"T027843",
"T046484",
"398363",
"920206",
"1607324",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50065"
}
]
}
fkie_cve-2016-10044
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| security@android.com | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a | Issue Tracking, Patch, Third Party Advisory | |
| security@android.com | http://source.android.com/security/bulletin/2017-02-01.html | Patch, Third Party Advisory | |
| security@android.com | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7 | Release Notes, Vendor Advisory | |
| security@android.com | http://www.securityfocus.com/bid/96122 | Third Party Advisory, VDB Entry | |
| security@android.com | http://www.securitytracker.com/id/1037798 | Third Party Advisory, VDB Entry | |
| security@android.com | https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://source.android.com/security/bulletin/2017-02-01.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96122 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037798 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a | Issue Tracking, Patch, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| android | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE61EB40-EE9C-41E8-AC78-D38441DB9CF6",
"versionEndExcluding": "3.16.43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21856BF4-4072-4055-BA57-93D5C4608C07",
"versionEndExcluding": "4.4.24",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "004A2488-AD73-4B53-961A-EEA808A5183D",
"versionEndExcluding": "4.7.7",
"versionStartIncluding": "4.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F11609D-D1B4-4DD6-8CC7-A224344E1E67",
"versionEndIncluding": "7.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call."
},
{
"lang": "es",
"value": "La funci\u00f3n aio_mount en fs/aio.c en el kernel de Linux en versiones anteriores a 4.7.7 no restringe adecuadamente el acceso de ejecuci\u00f3n, lo que facilita a usuarios locales eludir restricciones de pol\u00edtica destinadas SELinux W^X, y consecuentemente obtener privilegios, a trav\u00e9s de una llamada de sistema io_setup."
}
],
"id": "CVE-2016-10044",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-02-07T07:59:00.293",
"references": [
{
"source": "security@android.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"source": "security@android.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://source.android.com/security/bulletin/2017-02-01.html"
},
{
"source": "security@android.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7"
},
{
"source": "security@android.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96122"
},
{
"source": "security@android.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037798"
},
{
"source": "security@android.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://source.android.com/security/bulletin/2017-02-01.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96122"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037798"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
}
],
"sourceIdentifier": "security@android.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
cnvd-2017-01391
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://source.android.com/security/bulletin/2017-02-01.html
| Name | ['Google Android One 0', 'Google Pixel C 0', 'Google Nexus Player 0', 'Google Nexus 9', 'Google Nexus 6P', 'Google Nexus 6', 'Google Nexus 5X', 'Google Pixel 0', 'Google Pixel XL 0'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "96122"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2016-10044",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044"
}
},
"description": "Android\u662f\u7f8e\u56fd\u8c37\u6b4c\u516c\u53f8\u548c\u5f00\u653e\u624b\u6301\u8bbe\u5907\u8054\u76df\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u4ee5Linux\u4e3a\u57fa\u7840\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\n\u591a\u6b3eGoogle\u8bbe\u5907\u4e0a\u7684Android\u4e2d\u7684\u5185\u6838\u6587\u4ef6\u5b50\u7cfb\u7edf\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7\u7279\u6b8a\u7684\u6076\u610f\u5e94\u7528\u7a0b\u5e8f\uff0c\u63d0\u5347\u6743\u9650\u3002",
"discovererName": "Google",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://source.android.com/security/bulletin/2017-02-01.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-01391",
"openTime": "2017-02-16",
"patchDescription": "Android\u662f\u7f8e\u56fd\u8c37\u6b4c\u516c\u53f8\u548c\u5f00\u653e\u624b\u6301\u8bbe\u5907\u8054\u76df\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u4ee5Linux\u4e3a\u57fa\u7840\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\n\u591a\u6b3eGoogle\u8bbe\u5907\u4e0a\u7684Android\u4e2d\u7684\u5185\u6838\u6587\u4ef6\u5b50\u7cfb\u7edf\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7\u7279\u6b8a\u7684\u6076\u610f\u5e94\u7528\u7a0b\u5e8f\uff0c\u63d0\u5347\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Android\u5185\u6838\u6587\u4ef6\u5b50\u7cfb\u7edf\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Google Android One 0",
"Google Pixel C 0",
"Google Nexus Player 0",
"Google Nexus 9",
"Google Nexus 6P",
"Google Nexus 6",
"Google Nexus 5X",
"Google Pixel 0",
"Google Pixel XL 0"
]
},
"referenceLink": "http://www.securityfocus.com/bid/96122",
"serverity": "\u9ad8",
"submitTime": "2017-02-10",
"title": "Google Android\u5185\u6838\u6587\u4ef6\u5b50\u7cfb\u7edf\u6743\u9650\u63d0\u5347\u6f0f\u6d1e"
}
ghsa-mm9p-48xr-prf2
Vulnerability from github
The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
{
"affected": [],
"aliases": [
"CVE-2016-10044"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-02-07T07:59:00Z",
"severity": "HIGH"
},
"details": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.",
"id": "GHSA-mm9p-48xr-prf2",
"modified": "2022-05-17T02:26:55Z",
"published": "2022-05-17T02:26:55Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10044"
},
{
"type": "WEB",
"url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"type": "WEB",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"type": "WEB",
"url": "http://source.android.com/security/bulletin/2017-02-01.html"
},
{
"type": "WEB",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/96122"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1037798"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
gsd-2016-10044
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2016-10044",
"description": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.",
"id": "GSD-2016-10044",
"references": [
"https://www.suse.com/security/cve/CVE-2016-10044.html",
"https://ubuntu.com/security/CVE-2016-10044",
"https://linux.oracle.com/cve/CVE-2016-10044.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-10044"
],
"details": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.",
"id": "GSD-2016-10044",
"modified": "2023-12-13T01:21:26.497343Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-10044",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7"
},
{
"name": "1037798",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037798"
},
{
"name": "http://source.android.com/security/bulletin/2017-02-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2017-02-01.html"
},
{
"name": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"name": "96122",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96122"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.16.43",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.4.24",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.7.7",
"versionStartIncluding": "4.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.1.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@android.com",
"ID": "CVE-2016-10044"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7",
"refsource": "CONFIRM",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7"
},
{
"name": "http://source.android.com/security/bulletin/2017-02-01.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://source.android.com/security/bulletin/2017-02-01.html"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
},
{
"name": "96122",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96122"
},
{
"name": "1037798",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037798"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-01-17T21:40Z",
"publishedDate": "2017-02-07T07:59Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.