Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2004-0230
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:10:03.682Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "oval:org.mitre.oval:def:2689", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689", }, { name: "oval:org.mitre.oval:def:3508", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508", }, { name: "TA04-111A", tags: [ "third-party-advisory", "x_refsource_CERT", "x_transferred", ], url: "http://www.us-cert.gov/cas/techalerts/TA04-111A.html", }, { name: "oval:org.mitre.oval:def:5711", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711", }, { name: "20040425 Perl code exploting TCP not checking RST ACK.", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=108302060014745&w=2", }, { name: "SSRT061264", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", }, { name: "MS06-064", tags: [ "vendor-advisory", "x_refsource_MS", "x_transferred", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064", }, { name: "11440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/11440", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/JSA10638", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "VU#415294", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/415294", }, { name: "SSRT4696", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=108506952116653&w=2", }, { name: "SCOSA-2005.9", tags: [ "vendor-advisory", "x_refsource_SCO", "x_transferred", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt", }, { name: "20040403-01-A", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc", }, { name: "MS05-019", tags: [ "vendor-advisory", "x_refsource_MS", "x_transferred", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019", }, { name: "HPSBST02161", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { name: "20040420 TCP Vulnerabilities in Multiple IOS-Based Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml", }, { name: "SCOSA-2005.3", tags: [ "vendor-advisory", "x_refsource_SCO", "x_transferred", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt", }, { name: "10183", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/10183", }, { name: "oval:org.mitre.oval:def:4791", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791", }, { name: "SCOSA-2005.14", tags: [ "vendor-advisory", "x_refsource_SCO", "x_transferred", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt", }, { name: "oval:org.mitre.oval:def:270", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270", }, { name: "tcp-rst-dos(15886)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15886", }, { name: "4030", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/4030", }, { name: "22341", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/22341", }, { name: "NetBSD-SA2004-006", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc", }, { name: "ADV-2006-3983", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/3983", }, { name: "11458", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/11458", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-04-20T00:00:00", descriptions: [ { lang: "en", value: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-19T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "oval:org.mitre.oval:def:2689", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689", }, { name: "oval:org.mitre.oval:def:3508", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508", }, { name: "TA04-111A", tags: [ "third-party-advisory", "x_refsource_CERT", ], url: "http://www.us-cert.gov/cas/techalerts/TA04-111A.html", }, { name: "oval:org.mitre.oval:def:5711", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711", }, { name: "20040425 Perl code exploting TCP not checking RST ACK.", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=108302060014745&w=2", }, { name: "SSRT061264", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { tags: [ "x_refsource_MISC", ], url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", }, { name: "MS06-064", tags: [ "vendor-advisory", "x_refsource_MS", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064", }, { name: "11440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/11440", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/JSA10638", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "VU#415294", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/415294", }, { name: "SSRT4696", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=108506952116653&w=2", }, { name: "SCOSA-2005.9", tags: [ "vendor-advisory", "x_refsource_SCO", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt", }, { name: "20040403-01-A", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc", }, { name: "MS05-019", tags: [ "vendor-advisory", "x_refsource_MS", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019", }, { name: "HPSBST02161", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { name: "20040420 TCP Vulnerabilities in Multiple IOS-Based Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml", }, { name: "SCOSA-2005.3", tags: [ "vendor-advisory", "x_refsource_SCO", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt", }, { name: "10183", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/10183", }, { name: "oval:org.mitre.oval:def:4791", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791", }, { name: "SCOSA-2005.14", tags: [ "vendor-advisory", "x_refsource_SCO", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt", }, { name: "oval:org.mitre.oval:def:270", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270", }, { name: "tcp-rst-dos(15886)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15886", }, { name: "4030", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/4030", }, { name: "22341", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/22341", }, { name: "NetBSD-SA2004-006", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc", }, { name: "ADV-2006-3983", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/3983", }, { name: "11458", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/11458", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0230", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "oval:org.mitre.oval:def:2689", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689", }, { name: "oval:org.mitre.oval:def:3508", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508", }, { name: "TA04-111A", refsource: "CERT", url: "http://www.us-cert.gov/cas/techalerts/TA04-111A.html", }, { name: "oval:org.mitre.oval:def:5711", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711", }, { name: "20040425 Perl code exploting TCP not checking RST ACK.", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=108302060014745&w=2", }, { name: "SSRT061264", refsource: "HP", url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { name: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", refsource: "MISC", url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", }, { name: "MS06-064", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064", }, { name: "11440", refsource: "SECUNIA", url: "http://secunia.com/advisories/11440", }, { name: "http://kb.juniper.net/JSA10638", refsource: "CONFIRM", url: "http://kb.juniper.net/JSA10638", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "VU#415294", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/415294", }, { name: "SSRT4696", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=108506952116653&w=2", }, { name: "SCOSA-2005.9", refsource: "SCO", url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt", }, { name: "20040403-01-A", refsource: "SGI", url: "ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc", }, { name: "MS05-019", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019", }, { name: "HPSBST02161", refsource: "HP", url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { name: "20040420 TCP Vulnerabilities in Multiple IOS-Based Cisco Products", refsource: "CISCO", url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml", }, { name: "SCOSA-2005.3", refsource: "SCO", url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt", }, { name: "10183", refsource: "BID", url: "http://www.securityfocus.com/bid/10183", }, { name: "oval:org.mitre.oval:def:4791", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791", }, { name: "SCOSA-2005.14", refsource: "SCO", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt", }, { name: "oval:org.mitre.oval:def:270", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270", }, { name: "tcp-rst-dos(15886)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15886", }, { name: "4030", refsource: "OSVDB", url: "http://www.osvdb.org/4030", }, { name: "22341", refsource: "SECUNIA", url: "http://secunia.com/advisories/22341", }, { name: "NetBSD-SA2004-006", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc", }, { name: "ADV-2006-3983", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2006/3983", }, { name: "11458", refsource: "SECUNIA", url: "http://secunia.com/advisories/11458", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0230", datePublished: "2004-05-05T04:00:00", dateReserved: "2004-03-17T00:00:00", dateUpdated: "2024-08-08T00:10:03.682Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2004-0230\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2004-08-18T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.\"},{\"lang\":\"es\",\"value\":\"TCP, cuando se usa un tamaño de ventana de transmisión grande, hace más fácil a atacantes remotos adivinar números de secuencia y causar una denegación de servicio (pérdida de la conexión) en conexiones TCP persistentes inyectando repetidamente un paquete TCP RST, especialmente en protocolos que usan conexiones de vida larga, como BGP.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"964B57CD-CB8A-4520-B358-1C93EC5EF2DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E8C192B-8044-4BF9-9F1F-57371FC0E8FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openpgp:openpgp:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE7DB4DC-5369-4087-B055-F1B1BFB50812\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.6\",\"matchCriteriaId\":\"F205B07D-D1C9-4761-9C63-D7BE5E2C73CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40679A45-CE96-4F49-B552-8FB5B6AD493F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99FB50CA-9C49-4358-8C1F-803CC976408D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D153658-7BAF-42D3-AA20-3B6193EB184B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10D9BF9-FCC7-4680-AD3A-95757FC005EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E8C3A4-9FA7-4F2A-8C65-D4404715E674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC78BA4-70F4-4B9F-93C2-B107E4DCC418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A10F5A-067E-4DD8-B585-ABCD6F6B324E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"249FA642-3732-4654-88CB-3F1D19A5860A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5071CA39-65B3-4AFB-8898-21819E57A084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C3F588-98DA-4F6F-A083-2B9EE534C561\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xinuos:openserver:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E2AD5B8-44C1-4981-A795-E76EFFD8C96E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xinuos:openserver:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29E97E1A-268A-4F18-86A4-39A960E2082C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57562A7F-7AB2-4A35-88EB-586EF9546D50\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xinuos:unixware:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25A2CA45-7476-4D11-9236-15072E4C9CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xinuos:unixware:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96B92D7-ED2E-439C-B1D7-949628CF4456\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/JSA10638\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq&m=108302060014745&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=108506952116653&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/11440\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://secunia.com/advisories/11458\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://secunia.com/advisories/22341\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/415294\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.osvdb.org/4030\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/449179/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/449179/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/10183\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.uniras.gov.uk/vuls/2004/236929/index.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA04-111A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3983\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/15886\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content&id=SB10053\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/JSA10638\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq&m=108302060014745&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=108506952116653&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/11440\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://secunia.com/advisories/11458\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://secunia.com/advisories/22341\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/415294\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.osvdb.org/4030\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/449179/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/449179/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/10183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.uniras.gov.uk/vuls/2004/236929/index.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA04-111A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3983\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/15886\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content&id=SB10053\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"<a href=\\\"https://cwe.mitre.org/data/definitions/331.html\\\">CWE-331: Insufficient Entropy</a>\",\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"The DHS advisory is a good source of background information about the\\nissue: http://www.us-cert.gov/cas/techalerts/TA04-111A.html\\n\\nIt is important to note that the issue described is a known function of TCP. In order to perform a connection reset an attacker would need to know the source and destination ip address and ports as well as being able to guess the sequence number within the window. These requirements seriously reduce the ability to trigger a connection reset on normal TCP connections. The DHS advisory explains that BGP routing is a specific case where being able to trigger a reset is easier than expected as the end points can be easily determined and\\nlarge window sizes are used. BGP routing is also signficantly affected by having it’s connections terminated. The major BGP peers have recently switched to requiring md5 signatures which mitigates against this attack.\\n\\nThe following article from Linux Weekly News also puts the flaw into context and shows why it does not pose a significant threat:\\nhttp://lwn.net/Articles/81560/\\n\\nRed Hat does not have any plans for action regarding this issue.\\n\",\"lastModified\":\"2006-08-16T00:00:00\"}]}}", }, }
fkie_cve-2004-0230
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
oracle | solaris | 10 | |
oracle | solaris | 11 | |
openpgp | openpgp | 2.6.2 | |
mcafee | network_data_loss_prevention | * | |
mcafee | network_data_loss_prevention | 9.2.0 | |
mcafee | network_data_loss_prevention | 9.2.1 | |
mcafee | network_data_loss_prevention | 9.2.2 | |
netbsd | netbsd | 1.5 | |
netbsd | netbsd | 1.5.1 | |
netbsd | netbsd | 1.5.2 | |
netbsd | netbsd | 1.5.3 | |
netbsd | netbsd | 1.6 | |
netbsd | netbsd | 1.6.1 | |
netbsd | netbsd | 1.6.2 | |
netbsd | netbsd | 2.0 | |
xinuos | openserver | 5.0.6 | |
xinuos | openserver | 5.0.7 | |
juniper | junos | * | |
xinuos | unixware | 7.1.1 | |
xinuos | unixware | 7.1.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", matchCriteriaId: "964B57CD-CB8A-4520-B358-1C93EC5EF2DC", vulnerable: true, }, { criteria: "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", matchCriteriaId: "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:openpgp:openpgp:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "FE7DB4DC-5369-4087-B055-F1B1BFB50812", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*", matchCriteriaId: "F205B07D-D1C9-4761-9C63-D7BE5E2C73CF", versionEndIncluding: "8.6", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.0:*:*:*:*:*:*:*", matchCriteriaId: "40679A45-CE96-4F49-B552-8FB5B6AD493F", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.1:*:*:*:*:*:*:*", matchCriteriaId: "99FB50CA-9C49-4358-8C1F-803CC976408D", vulnerable: true, }, { criteria: "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.2:*:*:*:*:*:*:*", matchCriteriaId: "8D153658-7BAF-42D3-AA20-3B6193EB184B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", matchCriteriaId: "E10D9BF9-FCC7-4680-AD3A-95757FC005EA", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", matchCriteriaId: "78E8C3A4-9FA7-4F2A-8C65-D4404715E674", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", matchCriteriaId: "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", matchCriteriaId: "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", matchCriteriaId: "28A10F5A-067E-4DD8-B585-ABCD6F6B324E", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*", matchCriteriaId: "249FA642-3732-4654-88CB-3F1D19A5860A", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*", matchCriteriaId: "5071CA39-65B3-4AFB-8898-21819E57A084", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*", matchCriteriaId: "A3C3F588-98DA-4F6F-A083-2B9EE534C561", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:xinuos:openserver:5.0.6:*:*:*:*:*:*:*", matchCriteriaId: "3E2AD5B8-44C1-4981-A795-E76EFFD8C96E", vulnerable: true, }, { criteria: "cpe:2.3:o:xinuos:openserver:5.0.7:*:*:*:*:*:*:*", matchCriteriaId: "29E97E1A-268A-4F18-86A4-39A960E2082C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", matchCriteriaId: "57562A7F-7AB2-4A35-88EB-586EF9546D50", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:xinuos:unixware:7.1.1:*:*:*:*:*:*:*", matchCriteriaId: "25A2CA45-7476-4D11-9236-15072E4C9CA6", vulnerable: true, }, { criteria: "cpe:2.3:o:xinuos:unixware:7.1.3:*:*:*:*:*:*:*", matchCriteriaId: "F96B92D7-ED2E-439C-B1D7-949628CF4456", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", }, { lang: "es", value: "TCP, cuando se usa un tamaño de ventana de transmisión grande, hace más fácil a atacantes remotos adivinar números de secuencia y causar una denegación de servicio (pérdida de la conexión) en conexiones TCP persistentes inyectando repetidamente un paquete TCP RST, especialmente en protocolos que usan conexiones de vida larga, como BGP.", }, ], evaluatorComment: "<a href=\"https://cwe.mitre.org/data/definitions/331.html\">CWE-331: Insufficient Entropy</a>", id: "CVE-2004-0230", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2004-08-18T04:00:00.000", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://kb.juniper.net/JSA10638", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=108302060014745&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=108506952116653&w=2", }, { source: "cve@mitre.org", tags: [ "Permissions Required", "Third Party Advisory", "VDB Entry", ], url: "http://secunia.com/advisories/11440", }, { source: "cve@mitre.org", tags: [ "Permissions Required", "Third Party Advisory", "VDB Entry", ], url: "http://secunia.com/advisories/11458", }, { source: "cve@mitre.org", tags: [ "Permissions Required", "Third Party Advisory", "VDB Entry", ], url: "http://secunia.com/advisories/22341", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/415294", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.osvdb.org/4030", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/10183", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA04-111A.html", }, { source: "cve@mitre.org", tags: [ "Permissions Required", ], url: "http://www.vupen.com/english/advisories/2006/3983", }, { source: "cve@mitre.org", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019", }, { source: "cve@mitre.org", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15886", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://kb.juniper.net/JSA10638", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=108302060014745&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=108506952116653&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", "VDB Entry", ], url: "http://secunia.com/advisories/11440", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", "VDB Entry", ], url: "http://secunia.com/advisories/11458", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", "VDB Entry", ], url: "http://secunia.com/advisories/22341", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/415294", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.osvdb.org/4030", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/10183", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA04-111A.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", ], url: "http://www.vupen.com/english/advisories/2006/3983", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15886", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "The DHS advisory is a good source of background information about the\nissue: http://www.us-cert.gov/cas/techalerts/TA04-111A.html\n\nIt is important to note that the issue described is a known function of TCP. In order to perform a connection reset an attacker would need to know the source and destination ip address and ports as well as being able to guess the sequence number within the window. These requirements seriously reduce the ability to trigger a connection reset on normal TCP connections. The DHS advisory explains that BGP routing is a specific case where being able to trigger a reset is easier than expected as the end points can be easily determined and\nlarge window sizes are used. BGP routing is also signficantly affected by having it’s connections terminated. The major BGP peers have recently switched to requiring md5 signatures which mitigates against this attack.\n\nThe following article from Linux Weekly News also puts the flaw into context and shows why it does not pose a significant threat:\nhttp://lwn.net/Articles/81560/\n\nRed Hat does not have any plans for action regarding this issue.\n", lastModified: "2006-08-16T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
suse-su-2017:1102-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SLE-11 SP4 kernel was updated to 3.0.101.rt130-68 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux kernel preserved the setgid bit during\n a setxattr call involving a tmpfs filesystem, which allowed local users to gain group privileges by leveraging the\n existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of\n an incomplete fix for CVE-2016-7097 (bnc#1021258).\n- CVE-2016-7097: posix_acl: Clear SGID bit when setting file permissions (bsc#995968).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations\n where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or\n cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and \n drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and\n cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet,\n especially in protocols that use long-lived connections, such as BGP (bnc#989152).\n- CVE-2015-1350: Denial of service in notify_change for filesystem xattrs (bsc#914939).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship\n between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause\n a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local\n malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate\n because it first requires compromising a privileged process and current compiler optimizations restrict access to the\n vulnerable code. (bnc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of \n sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system\n call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux\n kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed\n local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN\n capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2)\n SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly\n initialize Code Segment (CS) in certain error cases, which allowed local users\n to obtain sensitive information from kernel stack memory via a crafted\n application (bnc#1013038).\n- CVE-2016-9576: splice: introduce FMODE_SPLICE_READ and FMODE_SPLICE_WRITE (bsc#1013604)\n- CVE-2016-9794: ALSA: pcm : Call kill_fasync() in stream lock (bsc#1013533)\n- CVE-2016-3841: KABI workaround for ipv6: add complete rcu protection around np->opt (bsc#992566).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c\n in the Linux kernel allowed local users to cause a denial of service (memory\n consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in\n drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or\n cause a denial of service (memory corruption and system crash) by detaching a\n device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the\n Linux kernel lacks chunk-length checking for the first chunk, which allowed\n remote attackers to cause a denial of service (out-of-bounds slab access) or\n possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n - CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in\n block/genhd.c in the Linux kernel allowed local users to gain privileges by\n leveraging the execution of a certain stop operation even if the corresponding\n start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in\n block/ioprio.c in the Linux kernel allowed local users to gain privileges or\n cause a denial of service (use-after-free) via a crafted ioprio_get system call\n (bnc#1010711).\n- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to\n gain privileges or cause a denial of service (system crash) via a VAPIC\n synchronization operation involving a page-end address (bnc#853052).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c\n in the Linux kernel allowed local users to obtain sensitive information from\n kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Revert 'proc: prevent accessing /proc/<PID>/environ until it's ready (bsc#1010467)'\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux\n kernel allowed local users to cause a denial of service (OOPS) by attempting to\n trigger use of in-kernel hash algorithms for a socket that has received zero\n bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in\n certain unusual hardware configurations, allowed remote attackers to execute\n arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-7042: KEYS: Fix short sprintf buffer in /proc/keys show function (bsc#1004517).\n- CVE-2015-8956: Bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925).\n- CVE-2016-7117: net: Fix use after free in the recvmmsg exit path (bsc#1003077).\n\nThe following non-security bugs were fixed:\n\n- blacklist.conf: 45f13df be2net: Enable Wake-On-LAN from shutdown for Skyhawk\n- blacklist.conf: c9cc599 net/mlx4_core: Fix QUERY FUNC CAP flags\n\n- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).\n- IB/mlx4: Fix error flow when sending mads under SRIOV (bsc#786036).\n- IB/mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036).\n- IB/mlx4: Fix memory leak if QP creation failed (bsc#786036).\n- IB/mlx4: Fix potential deadlock when sending mad to wire (bsc#786036).\n- IB/mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036).\n- IB/mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036).\n- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).\n- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).\n- be2net: Do not leak iomapped memory on removal (bug#925065).\n- block_dev: do not test bdev->bd_contains when it is not stable (bsc#1008557).\n- bna: Add synchronization for tx ring (bsc#993739).\n- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).\n- bnx2x: fix lockdep splat (bsc#908684).\n- cifs: revert fs/cifs: fix wrongly prefixed path to root (bsc#963655)\n- config.conf: add bigmem flavour on ppc64\n- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).\n- cpumask_set_cpu_local_first => cpumask_local_spread, lament (bug#919382).\n- crypto: add ghash-generic in the supported.conf(bsc#1016824)\n- crypto: aesni - Add support for 192 & 256 bit keys to AESNI RFC4106 (bsc#913387, #bsc1016831).\n- dm space map metadata: fix sm_bootstrap_get_nr_blocks()\n- dm thin: fix race condition when destroying thin pool workqueue\n- dm: do not call dm_sync_table() when creating new devices (bnc#901809, bsc#1008893).\n- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)\n- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).\n- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).\n- ext4: fix reference counting bug on block allocation error (bsc#1013018).\n- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).\n- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).\n- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).\n- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).\n- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681).\n- fs/cifs: make share unaccessible at root level mountable (bsc#799133).\n- futex: Acknowledge a new waiter in counter before plist (bsc#851603).\n- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).\n- hpilo: Add support for iLO5 (bsc#999101).\n- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).\n- hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).\n- hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).\n- hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).\n- hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).\n- hv: vmbus: handle various crash scenarios (bnc#986337).\n- hv: vmbus: remove code duplication in message handling (bnc#986337).\n- hv: vss: run only on supported host versions (bnc#986337).\n- i40e: fix an uninitialized variable bug (bsc#909484).\n- ibmveth: calculate gso_segs for large packets (bsc#1019165, bsc#1019148).\n- ibmveth: set correct gso_size and gso_type (bsc#1019165, bsc#1019148).\n- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491).\n- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297).\n- igb: Fix oops caused by missing queue pairing (bsc#909491).\n- igb: Fix oops on changing number of rings (bsc#909491).\n- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491).\n- igb: Unpair the queues when changing the number of queues (bsc#909491).\n- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).\n- kabi-fix for flock_owner addition (bsc#998689).\n- kexec: add a kexec_crash_loaded() function (bsc#973691).\n- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).\n- kvm: Distangle eventfd code from irqchip (bsc#989680).\n- kvm: Iterate over only vcpus that are preempted (bsc#989680).\n- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).\n- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).\n- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).\n- kvm: make processes waiting on vcpu mutex killable (bsc#989680).\n- kvm: nVMX: Add preemption timer support (bsc#989680).\n- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).\n- kvm: use symbolic constant for nr interrupts (bsc#989680).\n- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).\n- kvm: x86: Run PIT work in own kthread (bsc#989680).\n- kvm: x86: limit difference between kvmclock updates (bsc#989680).\n- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).\n- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).\n- libata: introduce ata_host->n_tags to avoid oops on SAS controllers (bsc#871728).\n- libata: remove n_tags to avoid kABI breakage (bsc#871728).\n- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)\n- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: Update rport reference counting (bsc#953233).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).\n- md/raid10: Fix memory leak when raid10 reshape completes\n- md/raid10: always set reshape_safe when initializing reshape_position\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: fix problem when adding device to read-only array with bitmap (bnc#771065).\n- memstick: mspro_block: add missing curly braces (bsc#1016688).\n- mlx4: add missing braces in verify_qp_parameters (bsc#786036).\n- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).\n- mm/memory.c: actually remap enough memory (bnc#1005903).\n- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).\n- mm: fix crashes from mbind() merging vmas (bnc#1005877).\n- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).\n- dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).\n- mshyperv: fix recognition of Hyper-V guest crash MSR's (bnc#986337).\n- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036).\n- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382).\n- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036).\n- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).\n- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708 bsc#786036).\n- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bug#919382).\n- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036).\n- net/mlx4_core: Implement pci_resume callback (bsc#924708).\n- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382).\n- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382).\n- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382).\n- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036).\n- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036).\n- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382).\n- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382).\n- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).\n- netfront: do not truncate grant references.\n- netvsc: fix incorrect receive checksum offloading (bnc#1006917).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).\n- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).\n- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).\n- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nvme: Automatic namespace rescan (bsc#1017686).\n- nvme: Metadata format support (bsc#1017686).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- oom: print nodemask in the oom report (bnc#1003866).\n- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models\n- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).\n- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).\n- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).\n- powerpc/mm: Change the swap encoding in pte (bsc#973203).\n- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).\n- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).\n- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).\n- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).\n- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).\n- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).\n- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).\n- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).\n- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).\n- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).\n- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).\n- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).\n- powerpc: Add ability to build little endian kernels (bsc#967716).\n- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).\n- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).\n- powerpc: Do not build assembly files with ABIv2 (bsc#967716).\n- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).\n- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).\n- powerpc: Fix error when cross building TAGS & cscope (bsc#967716).\n- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).\n- powerpc: Make the vdso32 also build big-endian (bsc#967716).\n- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).\n- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).\n- powerpc: Remove buggy 9-year-old test for binutils < 2.12.1 (bsc#967716).\n- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).\n- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).\n- powerpc: Update kernel VSID range (bsc#928138,fate#319026).\n- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo 'CONFIG_PMAC'\n obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu\n- powerpc: dtc is required to build dtb files (bsc#967716).\n- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).\n- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).\n- qlcnic: fix a loop exit condition better (bsc#909350).\n- qlcnic: fix a timeout loop (bsc#909350)\n- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rpm/package-descriptions: add -bigmem description\n- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).\n- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).\n- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).\n- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).\n- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).\n- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).\n- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).\n- scsi_error: count medium access timeout only once per EH run (bsc#993832).\n- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)\n- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).\n- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618).\n- softirq: sirq threads raising another sirq delegate to the proper thread Otherwise, high priority timer threads expend\n cycles precessing other sirqs, potentially increasing wakeup latencies as thes process sirqs at a priority other than\n the priority specified by the user.\n- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).\n- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).\n- sunrpc: Fix reconnection timeouts (bsc#1014410).\n- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).\n- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).\n- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).\n- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).\n- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).\n- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).\n- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458).\n- tg3: Fix temperature reporting (bnc#790588).\n- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).\n- usb: console: fix potential use after free (bsc#1015817).\n- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).\n- usb: cp210x: Corrected USB request type definitions (bsc#1015932).\n- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).\n- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).\n- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).\n- usb: ipaq.c: fix a timeout loop (bsc#1015848).\n- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).\n- usb: option: fix runtime PM handling (bsc#1015752).\n- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).\n- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).\n- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).\n- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).\n- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).\n- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).\n- usb: sierra: fix AA deadlock in open error path (bsc#1015561).\n- usb: sierra: fix remote wakeup (bsc#1015561).\n- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).\n- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).\n- usb: sierra: fix use after free at suspend/resume (bsc#1015561).\n- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).\n- usb: usb_wwan: fix race between write and resume (bsc#1015760).\n- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).\n- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).\n- usb: usb_wwan: fix write and suspend race (bsc#1015760).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86, amd_nb: Clarify F15h, model 30h GART and L3 support\n- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).\n- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).\n- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors\n- x86/gart: Check for GART support before accessing GART registers\n- xenbus: do not invoke ->is_ready() for most device states (bsc#987333).\n- zcrypt: Fix hang condition on crypto card config-off (bsc#1016320).\n- zcrypt: Fix invalid domain response handling (bsc#1016320).\n- zfcp: Fix erratic device offline during EH (bsc#993832).\n- zfcp: close window with unblocked rport during rport gone (bnc#1003677).\n- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677).\n- zfcp: fix ELS/GS request&response length for hardware data router (bnc#1003677).\n- zfcp: fix payload trace length for SAN request&response (bnc#1003677).\n- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677).\n- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677).\n- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677).\n- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677).\n- zfcp: trace on request for open and close of WKA port (bnc#1003677).\n", title: "Description of the patch", }, { category: "details", text: "slertesp4-kernel-13074", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1102-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:1102-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20171102-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:1102-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html", }, { category: "self", summary: "SUSE Bug 1003077", url: "https://bugzilla.suse.com/1003077", }, { category: "self", summary: "SUSE Bug 1003344", url: "https://bugzilla.suse.com/1003344", }, { category: "self", summary: "SUSE Bug 1003568", url: "https://bugzilla.suse.com/1003568", }, { category: "self", summary: "SUSE Bug 1003677", url: "https://bugzilla.suse.com/1003677", }, { category: "self", summary: "SUSE Bug 1003813", url: "https://bugzilla.suse.com/1003813", }, { category: "self", summary: "SUSE Bug 1003866", url: "https://bugzilla.suse.com/1003866", }, { category: "self", summary: "SUSE Bug 1003925", url: "https://bugzilla.suse.com/1003925", }, { category: "self", summary: "SUSE Bug 1004517", url: "https://bugzilla.suse.com/1004517", }, { category: "self", summary: "SUSE Bug 1004520", url: "https://bugzilla.suse.com/1004520", }, { category: "self", summary: "SUSE Bug 1005857", url: "https://bugzilla.suse.com/1005857", }, { category: "self", summary: "SUSE Bug 1005877", url: "https://bugzilla.suse.com/1005877", }, { category: "self", summary: "SUSE Bug 1005896", url: "https://bugzilla.suse.com/1005896", }, { category: "self", summary: "SUSE Bug 1005903", url: "https://bugzilla.suse.com/1005903", }, { category: "self", summary: "SUSE Bug 1006917", url: "https://bugzilla.suse.com/1006917", }, { category: "self", summary: "SUSE Bug 1006919", url: "https://bugzilla.suse.com/1006919", }, { category: "self", summary: "SUSE Bug 1007615", url: "https://bugzilla.suse.com/1007615", }, { category: "self", summary: "SUSE Bug 1007944", url: "https://bugzilla.suse.com/1007944", }, { category: "self", summary: "SUSE Bug 1008557", url: "https://bugzilla.suse.com/1008557", }, { category: "self", summary: "SUSE Bug 1008645", url: "https://bugzilla.suse.com/1008645", }, { category: "self", summary: "SUSE Bug 1008831", url: "https://bugzilla.suse.com/1008831", }, { category: "self", summary: "SUSE Bug 1008833", url: "https://bugzilla.suse.com/1008833", }, { category: "self", summary: "SUSE Bug 1008893", url: "https://bugzilla.suse.com/1008893", }, { category: "self", summary: "SUSE Bug 1009875", url: "https://bugzilla.suse.com/1009875", }, { category: "self", summary: "SUSE Bug 1010150", url: "https://bugzilla.suse.com/1010150", }, { category: "self", summary: "SUSE Bug 1010175", url: "https://bugzilla.suse.com/1010175", }, { category: "self", summary: "SUSE Bug 1010201", url: "https://bugzilla.suse.com/1010201", }, { category: "self", summary: "SUSE Bug 1010467", url: "https://bugzilla.suse.com/1010467", }, { category: "self", summary: "SUSE Bug 1010501", url: "https://bugzilla.suse.com/1010501", }, { category: "self", summary: "SUSE Bug 1010507", url: "https://bugzilla.suse.com/1010507", }, { category: "self", summary: "SUSE Bug 1010711", url: "https://bugzilla.suse.com/1010711", }, { category: "self", summary: "SUSE Bug 1010716", url: "https://bugzilla.suse.com/1010716", }, { category: "self", summary: "SUSE Bug 1011685", url: "https://bugzilla.suse.com/1011685", }, { category: "self", summary: "SUSE Bug 1011820", url: "https://bugzilla.suse.com/1011820", }, { category: "self", summary: "SUSE Bug 1012411", url: "https://bugzilla.suse.com/1012411", }, { category: "self", summary: "SUSE Bug 1012422", url: "https://bugzilla.suse.com/1012422", }, { category: "self", summary: "SUSE Bug 1012832", url: "https://bugzilla.suse.com/1012832", }, { category: "self", summary: "SUSE Bug 1012851", url: "https://bugzilla.suse.com/1012851", }, { category: "self", summary: "SUSE Bug 1012917", url: "https://bugzilla.suse.com/1012917", }, { category: "self", summary: "SUSE Bug 1013018", url: "https://bugzilla.suse.com/1013018", }, { category: "self", summary: "SUSE Bug 1013038", url: "https://bugzilla.suse.com/1013038", }, { category: "self", summary: "SUSE Bug 1013042", url: "https://bugzilla.suse.com/1013042", }, { category: "self", summary: "SUSE Bug 1013070", url: "https://bugzilla.suse.com/1013070", }, { category: "self", summary: "SUSE Bug 1013531", url: "https://bugzilla.suse.com/1013531", }, { category: "self", summary: "SUSE Bug 1013533", url: "https://bugzilla.suse.com/1013533", }, { category: "self", summary: "SUSE Bug 1013542", url: "https://bugzilla.suse.com/1013542", }, { category: "self", summary: "SUSE Bug 1013604", url: "https://bugzilla.suse.com/1013604", }, { category: "self", summary: "SUSE Bug 1014410", url: "https://bugzilla.suse.com/1014410", }, { category: "self", summary: "SUSE Bug 1014454", url: "https://bugzilla.suse.com/1014454", }, { category: "self", summary: "SUSE Bug 1014746", url: "https://bugzilla.suse.com/1014746", }, { category: "self", summary: "SUSE Bug 1015561", url: "https://bugzilla.suse.com/1015561", }, { category: "self", summary: "SUSE Bug 1015752", url: "https://bugzilla.suse.com/1015752", }, { category: "self", summary: "SUSE Bug 1015760", url: "https://bugzilla.suse.com/1015760", }, { category: "self", summary: "SUSE Bug 1015796", url: "https://bugzilla.suse.com/1015796", }, { category: "self", summary: "SUSE Bug 1015803", url: "https://bugzilla.suse.com/1015803", }, { category: "self", summary: "SUSE Bug 1015817", url: "https://bugzilla.suse.com/1015817", }, { category: "self", summary: "SUSE Bug 1015828", url: "https://bugzilla.suse.com/1015828", }, { category: "self", summary: "SUSE Bug 1015844", url: "https://bugzilla.suse.com/1015844", }, { category: "self", summary: "SUSE Bug 1015848", url: "https://bugzilla.suse.com/1015848", }, { category: "self", summary: "SUSE Bug 1015878", url: "https://bugzilla.suse.com/1015878", }, { category: "self", summary: "SUSE Bug 1015932", url: "https://bugzilla.suse.com/1015932", }, { category: "self", summary: "SUSE Bug 1016320", url: "https://bugzilla.suse.com/1016320", }, { category: "self", summary: "SUSE Bug 1016505", url: "https://bugzilla.suse.com/1016505", }, { category: "self", summary: "SUSE Bug 1016520", url: "https://bugzilla.suse.com/1016520", }, { category: "self", summary: "SUSE Bug 1016668", url: "https://bugzilla.suse.com/1016668", }, { category: "self", summary: "SUSE Bug 1016688", url: "https://bugzilla.suse.com/1016688", }, { category: "self", summary: "SUSE Bug 1016824", url: "https://bugzilla.suse.com/1016824", }, { category: "self", summary: "SUSE Bug 1016831", url: "https://bugzilla.suse.com/1016831", }, { category: "self", summary: "SUSE Bug 1017686", url: "https://bugzilla.suse.com/1017686", }, { category: "self", summary: "SUSE Bug 1017710", url: "https://bugzilla.suse.com/1017710", }, { category: "self", summary: "SUSE Bug 1019148", url: "https://bugzilla.suse.com/1019148", }, { category: "self", summary: "SUSE Bug 1019165", url: "https://bugzilla.suse.com/1019165", }, { category: "self", summary: "SUSE Bug 1019348", url: "https://bugzilla.suse.com/1019348", }, { category: "self", summary: "SUSE Bug 1019783", url: "https://bugzilla.suse.com/1019783", }, { category: "self", summary: "SUSE Bug 1020214", url: "https://bugzilla.suse.com/1020214", }, { category: "self", summary: "SUSE Bug 1021258", url: "https://bugzilla.suse.com/1021258", }, { category: "self", summary: "SUSE Bug 748806", url: "https://bugzilla.suse.com/748806", }, { category: "self", summary: "SUSE Bug 763198", url: "https://bugzilla.suse.com/763198", }, { category: "self", summary: "SUSE Bug 771065", url: "https://bugzilla.suse.com/771065", }, { category: "self", summary: "SUSE Bug 786036", url: "https://bugzilla.suse.com/786036", }, { category: "self", summary: "SUSE Bug 790588", url: "https://bugzilla.suse.com/790588", }, { category: "self", summary: "SUSE Bug 795297", url: "https://bugzilla.suse.com/795297", }, { category: "self", summary: "SUSE Bug 799133", url: "https://bugzilla.suse.com/799133", }, { category: "self", summary: "SUSE Bug 800999", url: "https://bugzilla.suse.com/800999", }, { category: "self", summary: "SUSE Bug 803320", url: "https://bugzilla.suse.com/803320", }, { category: "self", summary: "SUSE Bug 821612", url: "https://bugzilla.suse.com/821612", }, { category: "self", summary: "SUSE Bug 824171", url: "https://bugzilla.suse.com/824171", }, { category: "self", summary: "SUSE Bug 851603", url: "https://bugzilla.suse.com/851603", }, { category: "self", summary: "SUSE Bug 853052", url: "https://bugzilla.suse.com/853052", }, { category: "self", summary: "SUSE Bug 860441", url: "https://bugzilla.suse.com/860441", }, { category: "self", summary: "SUSE Bug 863873", url: "https://bugzilla.suse.com/863873", }, { category: "self", summary: "SUSE Bug 865783", url: "https://bugzilla.suse.com/865783", }, { category: "self", summary: "SUSE Bug 871728", url: "https://bugzilla.suse.com/871728", }, { category: "self", summary: "SUSE Bug 901809", url: "https://bugzilla.suse.com/901809", }, { category: "self", summary: "SUSE Bug 907611", url: "https://bugzilla.suse.com/907611", }, { category: "self", summary: "SUSE Bug 908458", url: "https://bugzilla.suse.com/908458", }, { category: "self", summary: "SUSE Bug 908684", url: "https://bugzilla.suse.com/908684", }, { category: "self", summary: "SUSE Bug 909077", url: "https://bugzilla.suse.com/909077", }, { category: "self", summary: "SUSE Bug 909350", url: "https://bugzilla.suse.com/909350", }, { category: "self", summary: "SUSE Bug 909484", url: "https://bugzilla.suse.com/909484", }, { category: "self", summary: "SUSE Bug 909491", url: "https://bugzilla.suse.com/909491", }, { category: "self", summary: "SUSE Bug 909618", url: "https://bugzilla.suse.com/909618", }, { category: "self", summary: "SUSE Bug 913387", url: "https://bugzilla.suse.com/913387", }, { category: "self", summary: "SUSE Bug 914939", url: "https://bugzilla.suse.com/914939", }, { category: "self", summary: "SUSE Bug 919382", url: "https://bugzilla.suse.com/919382", }, { category: "self", summary: "SUSE Bug 922634", url: "https://bugzilla.suse.com/922634", }, { category: "self", summary: "SUSE Bug 924708", url: "https://bugzilla.suse.com/924708", }, { category: "self", summary: "SUSE Bug 925065", url: "https://bugzilla.suse.com/925065", }, { category: "self", summary: "SUSE Bug 928138", url: "https://bugzilla.suse.com/928138", }, { category: "self", summary: "SUSE Bug 929141", url: "https://bugzilla.suse.com/929141", }, { category: "self", summary: "SUSE Bug 953233", url: "https://bugzilla.suse.com/953233", }, { category: "self", summary: "SUSE Bug 956514", url: "https://bugzilla.suse.com/956514", }, { category: "self", summary: "SUSE Bug 960689", url: "https://bugzilla.suse.com/960689", }, { category: "self", summary: "SUSE Bug 961589", url: "https://bugzilla.suse.com/961589", }, { category: "self", summary: "SUSE Bug 962846", url: "https://bugzilla.suse.com/962846", }, { category: "self", summary: "SUSE Bug 963655", url: "https://bugzilla.suse.com/963655", }, { category: "self", summary: "SUSE Bug 967716", url: "https://bugzilla.suse.com/967716", }, { category: "self", summary: "SUSE Bug 968010", url: "https://bugzilla.suse.com/968010", }, { category: "self", summary: "SUSE Bug 969340", url: "https://bugzilla.suse.com/969340", }, { category: "self", summary: "SUSE Bug 973203", url: "https://bugzilla.suse.com/973203", }, { category: "self", summary: "SUSE Bug 973691", url: "https://bugzilla.suse.com/973691", }, { category: "self", summary: "SUSE Bug 979681", url: "https://bugzilla.suse.com/979681", }, { category: "self", summary: "SUSE Bug 984194", url: "https://bugzilla.suse.com/984194", }, { category: "self", summary: "SUSE Bug 986337", url: "https://bugzilla.suse.com/986337", }, { category: "self", summary: "SUSE Bug 987333", url: "https://bugzilla.suse.com/987333", }, { category: "self", summary: "SUSE Bug 987576", url: "https://bugzilla.suse.com/987576", }, { category: "self", summary: "SUSE Bug 989152", url: "https://bugzilla.suse.com/989152", }, { category: "self", summary: "SUSE Bug 989680", url: "https://bugzilla.suse.com/989680", }, { category: "self", summary: "SUSE Bug 989764", url: "https://bugzilla.suse.com/989764", }, { category: "self", summary: "SUSE Bug 989896", url: "https://bugzilla.suse.com/989896", }, { category: "self", summary: "SUSE Bug 990245", url: "https://bugzilla.suse.com/990245", }, { category: "self", summary: "SUSE Bug 992566", url: "https://bugzilla.suse.com/992566", }, { category: "self", summary: "SUSE Bug 992991", url: "https://bugzilla.suse.com/992991", }, { category: "self", summary: "SUSE Bug 993739", url: "https://bugzilla.suse.com/993739", }, { category: "self", summary: "SUSE Bug 993832", url: "https://bugzilla.suse.com/993832", }, { category: "self", summary: "SUSE Bug 995968", url: "https://bugzilla.suse.com/995968", }, { category: "self", summary: "SUSE Bug 996541", url: "https://bugzilla.suse.com/996541", }, { category: "self", summary: "SUSE Bug 996557", url: "https://bugzilla.suse.com/996557", }, { category: "self", summary: "SUSE Bug 997401", url: "https://bugzilla.suse.com/997401", }, { category: "self", summary: "SUSE Bug 998689", url: "https://bugzilla.suse.com/998689", }, { category: "self", summary: "SUSE Bug 999101", url: "https://bugzilla.suse.com/999101", }, { category: "self", summary: "SUSE Bug 999907", url: "https://bugzilla.suse.com/999907", }, { category: "self", summary: "SUSE CVE CVE-2004-0230 page", url: "https://www.suse.com/security/cve/CVE-2004-0230/", }, { category: "self", summary: "SUSE CVE CVE-2012-6704 page", url: "https://www.suse.com/security/cve/CVE-2012-6704/", }, { category: "self", summary: "SUSE CVE CVE-2013-6368 page", url: "https://www.suse.com/security/cve/CVE-2013-6368/", }, { category: "self", summary: "SUSE CVE CVE-2015-1350 page", url: "https://www.suse.com/security/cve/CVE-2015-1350/", }, { category: "self", summary: "SUSE CVE CVE-2015-8956 page", url: "https://www.suse.com/security/cve/CVE-2015-8956/", }, { category: "self", summary: "SUSE CVE CVE-2015-8962 page", url: "https://www.suse.com/security/cve/CVE-2015-8962/", }, { category: "self", summary: "SUSE CVE CVE-2015-8964 page", url: "https://www.suse.com/security/cve/CVE-2015-8964/", }, { category: "self", summary: "SUSE CVE CVE-2016-10088 page", url: "https://www.suse.com/security/cve/CVE-2016-10088/", }, { category: "self", summary: "SUSE CVE CVE-2016-3841 page", url: "https://www.suse.com/security/cve/CVE-2016-3841/", }, { category: "self", summary: "SUSE CVE CVE-2016-5696 page", url: "https://www.suse.com/security/cve/CVE-2016-5696/", }, { category: "self", summary: "SUSE CVE CVE-2016-7042 page", url: "https://www.suse.com/security/cve/CVE-2016-7042/", }, { category: "self", summary: "SUSE CVE CVE-2016-7097 page", url: "https://www.suse.com/security/cve/CVE-2016-7097/", }, { category: "self", summary: "SUSE CVE CVE-2016-7117 page", url: "https://www.suse.com/security/cve/CVE-2016-7117/", }, { category: "self", summary: "SUSE CVE CVE-2016-7910 page", url: "https://www.suse.com/security/cve/CVE-2016-7910/", }, { category: "self", summary: "SUSE CVE CVE-2016-7911 page", url: "https://www.suse.com/security/cve/CVE-2016-7911/", }, { category: "self", summary: "SUSE CVE CVE-2016-7916 page", url: "https://www.suse.com/security/cve/CVE-2016-7916/", }, { category: "self", summary: "SUSE CVE CVE-2016-8399 page", url: "https://www.suse.com/security/cve/CVE-2016-8399/", }, { category: "self", summary: "SUSE CVE CVE-2016-8632 page", url: "https://www.suse.com/security/cve/CVE-2016-8632/", }, { category: "self", summary: "SUSE CVE CVE-2016-8633 page", url: "https://www.suse.com/security/cve/CVE-2016-8633/", }, { category: "self", summary: "SUSE CVE CVE-2016-8646 page", url: "https://www.suse.com/security/cve/CVE-2016-8646/", }, { category: "self", summary: "SUSE CVE CVE-2016-9555 page", url: "https://www.suse.com/security/cve/CVE-2016-9555/", }, { category: "self", summary: "SUSE CVE CVE-2016-9576 page", url: "https://www.suse.com/security/cve/CVE-2016-9576/", }, { category: "self", summary: "SUSE CVE CVE-2016-9685 page", url: "https://www.suse.com/security/cve/CVE-2016-9685/", }, { category: "self", summary: "SUSE CVE CVE-2016-9756 page", url: "https://www.suse.com/security/cve/CVE-2016-9756/", }, { category: "self", summary: "SUSE CVE CVE-2016-9793 page", url: "https://www.suse.com/security/cve/CVE-2016-9793/", }, { category: "self", summary: "SUSE CVE CVE-2016-9794 page", url: "https://www.suse.com/security/cve/CVE-2016-9794/", }, { category: "self", summary: "SUSE CVE CVE-2017-5551 page", url: "https://www.suse.com/security/cve/CVE-2017-5551/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2017-04-25T14:34:26Z", generator: { date: "2017-04-25T14:34:26Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:1102-1", initial_release_date: "2017-04-25T14:34:26Z", revision_history: [ { date: "2017-04-25T14:34:26Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-rt-3.0.101.rt130-68.1.x86_64", product: { name: "kernel-rt-3.0.101.rt130-68.1.x86_64", product_id: "kernel-rt-3.0.101.rt130-68.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-3.0.101.rt130-68.1.x86_64", product: { name: "kernel-rt-base-3.0.101.rt130-68.1.x86_64", product_id: "kernel-rt-base-3.0.101.rt130-68.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-3.0.101.rt130-68.1.x86_64", product: { name: "kernel-rt-devel-3.0.101.rt130-68.1.x86_64", product_id: "kernel-rt-devel-3.0.101.rt130-68.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_trace-3.0.101.rt130-68.1.x86_64", product: { name: "kernel-rt_trace-3.0.101.rt130-68.1.x86_64", product_id: "kernel-rt_trace-3.0.101.rt130-68.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", product: { name: "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", product_id: "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", product: { name: "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", product_id: "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", }, }, { category: "product_version", name: "kernel-source-rt-3.0.101.rt130-68.1.x86_64", product: { name: "kernel-source-rt-3.0.101.rt130-68.1.x86_64", product_id: "kernel-source-rt-3.0.101.rt130-68.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-3.0.101.rt130-68.1.x86_64", product: { name: "kernel-syms-rt-3.0.101.rt130-68.1.x86_64", product_id: "kernel-syms-rt-3.0.101.rt130-68.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 11 SP4", product: { name: "SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4", product_identification_helper: { cpe: "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", }, product_reference: "kernel-rt-3.0.101.rt130-68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", }, product_reference: "kernel-rt-base-3.0.101.rt130-68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", }, product_reference: "kernel-rt-devel-3.0.101.rt130-68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_trace-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", }, product_reference: "kernel-rt_trace-3.0.101.rt130-68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", }, product_reference: "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", }, product_reference: "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", }, product_reference: "kernel-source-rt-3.0.101.rt130-68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", }, product_reference: "kernel-syms-rt-3.0.101.rt130-68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2004-0230", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2004-0230", }, ], notes: [ { category: "general", text: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2004-0230", url: "https://www.suse.com/security/cve/CVE-2004-0230", }, { category: "external", summary: "SUSE Bug 1184394 for CVE-2004-0230", url: "https://bugzilla.suse.com/1184394", }, { category: "external", summary: "SUSE Bug 1198501 for CVE-2004-0230", url: "https://bugzilla.suse.com/1198501", }, { category: "external", summary: "SUSE Bug 1206598 for CVE-2004-0230", url: "https://bugzilla.suse.com/1206598", }, { category: "external", summary: "SUSE Bug 969340 for CVE-2004-0230", url: "https://bugzilla.suse.com/969340", }, { category: "external", summary: "SUSE Bug 989152 for CVE-2004-0230", url: "https://bugzilla.suse.com/989152", }, { category: "external", summary: "SUSE Bug 992991 for CVE-2004-0230", url: "https://bugzilla.suse.com/992991", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2004-0230", }, { cve: "CVE-2012-6704", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6704", }, ], notes: [ { category: "general", text: "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-6704", url: "https://www.suse.com/security/cve/CVE-2012-6704", }, { category: "external", summary: "SUSE Bug 1013531 for CVE-2012-6704", url: "https://bugzilla.suse.com/1013531", }, { category: "external", summary: "SUSE Bug 1013542 for CVE-2012-6704", url: "https://bugzilla.suse.com/1013542", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2012-6704", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2012-6704", }, { cve: "CVE-2013-6368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-6368", }, ], notes: [ { category: "general", text: "The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-6368", url: "https://www.suse.com/security/cve/CVE-2013-6368", }, { category: "external", summary: "SUSE Bug 853052 for CVE-2013-6368", url: "https://bugzilla.suse.com/853052", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2013-6368", }, { cve: "CVE-2015-1350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1350", }, ], notes: [ { category: "general", text: "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1350", url: "https://www.suse.com/security/cve/CVE-2015-1350", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2015-1350", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 914939 for CVE-2015-1350", url: "https://bugzilla.suse.com/914939", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2015-1350", }, { cve: "CVE-2015-8956", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8956", }, ], notes: [ { category: "general", text: "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8956", url: "https://www.suse.com/security/cve/CVE-2015-8956", }, { category: "external", summary: "SUSE Bug 1003925 for CVE-2015-8956", url: "https://bugzilla.suse.com/1003925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2015-8956", }, { cve: "CVE-2015-8962", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8962", }, ], notes: [ { category: "general", text: "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8962", url: "https://www.suse.com/security/cve/CVE-2015-8962", }, { category: "external", summary: "SUSE Bug 1010501 for CVE-2015-8962", url: "https://bugzilla.suse.com/1010501", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2015-8962", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2015-8962", }, { cve: "CVE-2015-8964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8964", }, ], notes: [ { category: "general", text: "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8964", url: "https://www.suse.com/security/cve/CVE-2015-8964", }, { category: "external", summary: "SUSE Bug 1010507 for CVE-2015-8964", url: "https://bugzilla.suse.com/1010507", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2015-8964", }, { cve: "CVE-2016-10088", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10088", }, ], notes: [ { category: "general", text: "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10088", url: "https://www.suse.com/security/cve/CVE-2016-10088", }, { category: "external", summary: "SUSE Bug 1013604 for CVE-2016-10088", url: "https://bugzilla.suse.com/1013604", }, { category: "external", summary: "SUSE Bug 1014271 for CVE-2016-10088", url: "https://bugzilla.suse.com/1014271", }, { category: "external", summary: "SUSE Bug 1017710 for CVE-2016-10088", url: "https://bugzilla.suse.com/1017710", }, { category: "external", summary: "SUSE Bug 1019079 for CVE-2016-10088", url: "https://bugzilla.suse.com/1019079", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-10088", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "important", }, ], title: "CVE-2016-10088", }, { cve: "CVE-2016-3841", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3841", }, ], notes: [ { category: "general", text: "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3841", url: "https://www.suse.com/security/cve/CVE-2016-3841", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-3841", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-3841", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 992566 for CVE-2016-3841", url: "https://bugzilla.suse.com/992566", }, { category: "external", summary: "SUSE Bug 992569 for CVE-2016-3841", url: "https://bugzilla.suse.com/992569", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-3841", }, { cve: "CVE-2016-5696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5696", }, ], notes: [ { category: "general", text: "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5696", url: "https://www.suse.com/security/cve/CVE-2016-5696", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-5696", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1175721 for CVE-2016-5696", url: "https://bugzilla.suse.com/1175721", }, { category: "external", summary: "SUSE Bug 989152 for CVE-2016-5696", url: "https://bugzilla.suse.com/989152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-5696", }, { cve: "CVE-2016-7042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7042", }, ], notes: [ { category: "general", text: "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7042", url: "https://www.suse.com/security/cve/CVE-2016-7042", }, { category: "external", summary: "SUSE Bug 1004517 for CVE-2016-7042", url: "https://bugzilla.suse.com/1004517", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-7042", }, { cve: "CVE-2016-7097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7097", }, ], notes: [ { category: "general", text: "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7097", url: "https://www.suse.com/security/cve/CVE-2016-7097", }, { category: "external", summary: "SUSE Bug 1021258 for CVE-2016-7097", url: "https://bugzilla.suse.com/1021258", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-7097", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-7097", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 995968 for CVE-2016-7097", url: "https://bugzilla.suse.com/995968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "low", }, ], title: "CVE-2016-7097", }, { cve: "CVE-2016-7117", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7117", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7117", url: "https://www.suse.com/security/cve/CVE-2016-7117", }, { category: "external", summary: "SUSE Bug 1003077 for CVE-2016-7117", url: "https://bugzilla.suse.com/1003077", }, { category: "external", summary: "SUSE Bug 1003253 for CVE-2016-7117", url: "https://bugzilla.suse.com/1003253", }, { category: "external", summary: "SUSE Bug 1057478 for CVE-2016-7117", url: "https://bugzilla.suse.com/1057478", }, { category: "external", summary: "SUSE Bug 1071943 for CVE-2016-7117", url: "https://bugzilla.suse.com/1071943", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-7117", }, { cve: "CVE-2016-7910", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7910", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7910", url: "https://www.suse.com/security/cve/CVE-2016-7910", }, { category: "external", summary: "SUSE Bug 1010716 for CVE-2016-7910", url: "https://bugzilla.suse.com/1010716", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7910", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 1196722 for CVE-2016-7910", url: "https://bugzilla.suse.com/1196722", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-7910", }, { cve: "CVE-2016-7911", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7911", }, ], notes: [ { category: "general", text: "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7911", url: "https://www.suse.com/security/cve/CVE-2016-7911", }, { category: "external", summary: "SUSE Bug 1010711 for CVE-2016-7911", url: "https://bugzilla.suse.com/1010711", }, { category: "external", summary: "SUSE Bug 1010713 for CVE-2016-7911", url: "https://bugzilla.suse.com/1010713", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7911", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-7911", }, { cve: "CVE-2016-7916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7916", }, ], notes: [ { category: "general", text: "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7916", url: "https://www.suse.com/security/cve/CVE-2016-7916", }, { category: "external", summary: "SUSE Bug 1010467 for CVE-2016-7916", url: "https://bugzilla.suse.com/1010467", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-7916", }, { cve: "CVE-2016-8399", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8399", }, ], notes: [ { category: "general", text: "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8399", url: "https://www.suse.com/security/cve/CVE-2016-8399", }, { category: "external", summary: "SUSE Bug 1014746 for CVE-2016-8399", url: "https://bugzilla.suse.com/1014746", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-8399", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-8399", }, { cve: "CVE-2016-8632", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8632", }, ], notes: [ { category: "general", text: "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8632", url: "https://www.suse.com/security/cve/CVE-2016-8632", }, { category: "external", summary: "SUSE Bug 1008831 for CVE-2016-8632", url: "https://bugzilla.suse.com/1008831", }, { category: "external", summary: "SUSE Bug 1012852 for CVE-2016-8632", url: "https://bugzilla.suse.com/1012852", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-8632", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-8632", }, { cve: "CVE-2016-8633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8633", }, ], notes: [ { category: "general", text: "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8633", url: "https://www.suse.com/security/cve/CVE-2016-8633", }, { category: "external", summary: "SUSE Bug 1008833 for CVE-2016-8633", url: "https://bugzilla.suse.com/1008833", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-8633", }, { cve: "CVE-2016-8646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8646", }, ], notes: [ { category: "general", text: "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8646", url: "https://www.suse.com/security/cve/CVE-2016-8646", }, { category: "external", summary: "SUSE Bug 1010150 for CVE-2016-8646", url: "https://bugzilla.suse.com/1010150", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-8646", }, { cve: "CVE-2016-9555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9555", }, ], notes: [ { category: "general", text: "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9555", url: "https://www.suse.com/security/cve/CVE-2016-9555", }, { category: "external", summary: "SUSE Bug 1011685 for CVE-2016-9555", url: "https://bugzilla.suse.com/1011685", }, { category: "external", summary: "SUSE Bug 1012183 for CVE-2016-9555", url: "https://bugzilla.suse.com/1012183", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-9555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "important", }, ], title: "CVE-2016-9555", }, { cve: "CVE-2016-9576", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9576", }, ], notes: [ { category: "general", text: "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9576", url: "https://www.suse.com/security/cve/CVE-2016-9576", }, { category: "external", summary: "SUSE Bug 1013604 for CVE-2016-9576", url: "https://bugzilla.suse.com/1013604", }, { category: "external", summary: "SUSE Bug 1014271 for CVE-2016-9576", url: "https://bugzilla.suse.com/1014271", }, { category: "external", summary: "SUSE Bug 1017710 for CVE-2016-9576", url: "https://bugzilla.suse.com/1017710", }, { category: "external", summary: "SUSE Bug 1019079 for CVE-2016-9576", url: "https://bugzilla.suse.com/1019079", }, { category: "external", summary: "SUSE Bug 1019668 for CVE-2016-9576", url: "https://bugzilla.suse.com/1019668", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-9576", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "important", }, ], title: "CVE-2016-9576", }, { cve: "CVE-2016-9685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9685", }, ], notes: [ { category: "general", text: "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9685", url: "https://www.suse.com/security/cve/CVE-2016-9685", }, { category: "external", summary: "SUSE Bug 1012832 for CVE-2016-9685", url: "https://bugzilla.suse.com/1012832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "low", }, ], title: "CVE-2016-9685", }, { cve: "CVE-2016-9756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9756", }, ], notes: [ { category: "general", text: "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9756", url: "https://www.suse.com/security/cve/CVE-2016-9756", }, { category: "external", summary: "SUSE Bug 1013038 for CVE-2016-9756", url: "https://bugzilla.suse.com/1013038", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-9756", }, { cve: "CVE-2016-9793", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9793", }, ], notes: [ { category: "general", text: "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9793", url: "https://www.suse.com/security/cve/CVE-2016-9793", }, { category: "external", summary: "SUSE Bug 1013531 for CVE-2016-9793", url: "https://bugzilla.suse.com/1013531", }, { category: "external", summary: "SUSE Bug 1013542 for CVE-2016-9793", url: "https://bugzilla.suse.com/1013542", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-9793", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-9793", }, { cve: "CVE-2016-9794", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9794", }, ], notes: [ { category: "general", text: "Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9794", url: "https://www.suse.com/security/cve/CVE-2016-9794", }, { category: "external", summary: "SUSE Bug 1013533 for CVE-2016-9794", url: "https://bugzilla.suse.com/1013533", }, { category: "external", summary: "SUSE Bug 1013543 for CVE-2016-9794", url: "https://bugzilla.suse.com/1013543", }, { category: "external", summary: "SUSE Bug 1013604 for CVE-2016-9794", url: "https://bugzilla.suse.com/1013604", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "moderate", }, ], title: "CVE-2016-9794", }, { cve: "CVE-2017-5551", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5551", }, ], notes: [ { category: "general", text: "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5551", url: "https://www.suse.com/security/cve/CVE-2017-5551", }, { category: "external", summary: "SUSE Bug 1021258 for CVE-2017-5551", url: "https://bugzilla.suse.com/1021258", }, { category: "external", summary: "SUSE Bug 995968 for CVE-2017-5551", url: "https://bugzilla.suse.com/995968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-04-25T14:34:26Z", details: "low", }, ], title: "CVE-2017-5551", }, ], }
suse-su-2017:0437-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-94 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-5551: tmpfs: clear S_ISGID when setting posix ACLs (bsc#1021258).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations\n where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations\n or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device\n NOTE: this vulnerability existed because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers\n and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST\n packet, especially in protocols that use long-lived connections, such as BGP (bnc#989152).\n- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provided an incomplete set of requirements for setattr\n operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial\n of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove\n a capability from the ping or Wireshark dumpcap program (bnc#914939).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship\n between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or\n cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability\n (bnc#1008831).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local\n malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate\n because it first requires compromising a privileged process and current compiler optimizations restrict access to the\n vulnerable code. (bnc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of\n sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system\n call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of\n sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system\n call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain\n error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted\n application (bnc#1013038).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users\n to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel\n allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching\n a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking\n for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or\n possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel\n allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the\n corresponding start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local\n users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call\n (bnc#1010711).\n- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of\n service (system crash) via a VAPIC synchronization operation involving a page-end address (bnc#853052).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users\n to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users\n to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time\n interval in which environment-variable copying is incomplete (bnc#1010467).\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a\n denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero\n bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote\n attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n\nThe following non-security bugs were fixed:\n\n- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).\n- KABI fix (bsc#1014410).\n- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).\n- be2net: Do not leak iomapped memory on removal (bug#925065).\n- block_dev: do not test bdev->bd_contains when it is not stable (bsc#1008557).\n- bna: Add synchronization for tx ring (bsc#993739).\n- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).\n- crypto: add ghash-generic in the supported.conf(bsc#1016824)\n- crypto: aesni - Add support for 192 & 256 bit keys to AESNI RFC4106 (bsc#913387).\n- dm: do not call dm_sync_table() when creating new devices (bnc#901809).\n- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)\n- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).\n- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).\n- ext4: fix reference counting bug on block allocation error (bsc#1013018).\n- futex: Acknowledge a new waiter in counter before plist (bsc#851603).\n- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).\n- hpilo: Add support for iLO5 (bsc#999101).\n- ibmveth: calculate gso_segs for large packets (bsc#1019165).\n- ibmveth: set correct gso_size and gso_type (bsc#1019165).\n- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491 FATE#317388).\n- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297 FATE#313656).\n- igb: Fix oops caused by missing queue pairing (bsc#909491 FATE#317388).\n- igb: Fix oops on changing number of rings (bsc#909491 FATE#317388).\n- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491 FATE#317388).\n- igb: Unpair the queues when changing the number of queues (bsc#909491 FATE#317388).\n- kexec: add a kexec_crash_loaded() function (bsc#973691).\n- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).\n- kvm: Distangle eventfd code from irqchip (bsc#989680).\n- kvm: Iterate over only vcpus that are preempted (bsc#989680).\n- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).\n- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).\n- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).\n- kvm: make processes waiting on vcpu mutex killable (bsc#989680).\n- kvm: nVMX: Add preemption timer support (bsc#989680).\n- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).\n- kvm: use symbolic constant for nr interrupts (bsc#989680).\n- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).\n- kvm: x86: Run PIT work in own kthread (bsc#989680).\n- kvm: x86: limit difference between kvmclock updates (bsc#989680).\n- libata: introduce ata_host->n_tags to avoid oops on SAS controllers (bsc#871728).\n- libata: remove n_tags to avoid kABI breakage (bsc#871728).\n- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: Update rport reference counting (bsc#953233).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).\n- memstick: mspro_block: add missing curly braces (bsc#1016688).\n- mlx4: Fix error flow when sending mads under SRIOV (bsc#786036 FATE#314304).\n- mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036 FATE#314304).\n- mlx4: Fix memory leak if QP creation failed (bsc#786036 FATE#314304).\n- mlx4: Fix potential deadlock when sending mad to wire (bsc#786036 FATE#314304).\n- mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036 FATE#314304).\n- mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036 FATE#314304).\n- mlx4: add missing braces in verify_qp_parameters (bsc#786036 FATE#314304).\n- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).\n- mm: fix crashes from mbind() merging vmas (bnc#1005877).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).\n- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036 FATE#314304).\n- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382 FATE#317529).\n- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036 FATE#314304).\n- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).\n- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708).\n- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bsc#919382 FATE#317529).\n- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036 FATE#314304).\n- net/mlx4_core: Implement pci_resume callback (bsc#924708).\n- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382 FATE#317529).\n- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382 FATE#317529).\n- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382 FATE#317529).\n- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036 FATE#314304).\n- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036 FATE#314304).\n- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382 FATE#317529).\n- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382 FATE#317529).\n- netfront: do not truncate grant references.\n- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).\n- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).\n- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).\n- nvme: Automatic namespace rescan (bsc#1017686).\n- nvme: Metadata format support (bsc#1017686).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).\n- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201).\n- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201).\n- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201).\n- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).\n- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201).\n- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201).\n- printk/sched: Introduce special printk_sched() for those awkward (bsc#996541).\n- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).\n- qlcnic: fix a loop exit condition better (bsc#909350 FATE#317546).\n- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999 FATE#313899).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).\n- s390/zcrypt: kernel: Fix invalid domain response handling (bsc#1016320).\n- scsi: Fix erratic device offline during EH (bsc#993832).\n- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).\n- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).\n- scsi_error: count medium access timeout only once per EH run (bsc#993832).\n- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)\n- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).\n- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).\n- sunrpc: Fix reconnection timeouts (bsc#1014410).\n- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).\n- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).\n- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).\n- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).\n- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).\n- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).\n- tg3: Fix temperature reporting (bnc#790588 FATE#313912).\n- usb: console: fix potential use after free (bsc#1015817).\n- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).\n- usb: cp210x: Corrected USB request type definitions (bsc#1015932).\n- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).\n- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).\n- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).\n- usb: ipaq.c: fix a timeout loop (bsc#1015848).\n- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).\n- usb: option: fix runtime PM handling (bsc#1015752).\n- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).\n- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).\n- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).\n- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).\n- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).\n- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).\n- usb: sierra: fix AA deadlock in open error path (bsc#1015561).\n- usb: sierra: fix remote wakeup (bsc#1015561).\n- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).\n- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).\n- usb: sierra: fix use after free at suspend/resume (bsc#1015561).\n- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).\n- usb: usb_wwan: fix race between write and resume (bsc#1015760).\n- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).\n- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).\n- usb: usb_wwan: fix write and suspend race (bsc#1015760).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).\n- xenbus: do not invoke is_ready() for most device states (bsc#987333).\n", title: "Description of the patch", }, { category: "details", text: "sdksp4-kernel-12977,slessp4-kernel-12977,slexsp3-kernel-12977", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0437-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:0437-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:0437-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html", }, { category: "self", summary: "SUSE Bug 1003813", url: "https://bugzilla.suse.com/1003813", }, { category: "self", summary: "SUSE Bug 1005877", url: "https://bugzilla.suse.com/1005877", }, { category: "self", summary: "SUSE Bug 1007615", url: "https://bugzilla.suse.com/1007615", }, { category: "self", summary: "SUSE Bug 1008557", url: "https://bugzilla.suse.com/1008557", }, { category: "self", summary: "SUSE Bug 1008645", url: "https://bugzilla.suse.com/1008645", }, { category: "self", summary: "SUSE Bug 1008831", url: "https://bugzilla.suse.com/1008831", }, { category: "self", summary: "SUSE Bug 1008833", url: "https://bugzilla.suse.com/1008833", }, { category: "self", summary: "SUSE Bug 1008893", url: "https://bugzilla.suse.com/1008893", }, { category: "self", summary: "SUSE Bug 1009875", url: "https://bugzilla.suse.com/1009875", }, { category: "self", summary: "SUSE Bug 1010150", url: "https://bugzilla.suse.com/1010150", }, { category: "self", summary: "SUSE Bug 1010175", url: "https://bugzilla.suse.com/1010175", }, { category: "self", summary: "SUSE Bug 1010201", url: "https://bugzilla.suse.com/1010201", }, { category: "self", summary: "SUSE Bug 1010467", url: "https://bugzilla.suse.com/1010467", }, { category: "self", summary: "SUSE Bug 1010501", url: "https://bugzilla.suse.com/1010501", }, { category: "self", summary: "SUSE Bug 1010507", url: "https://bugzilla.suse.com/1010507", }, { category: "self", summary: "SUSE Bug 1010711", url: "https://bugzilla.suse.com/1010711", }, { category: "self", summary: "SUSE Bug 1010713", url: "https://bugzilla.suse.com/1010713", }, { category: "self", summary: "SUSE Bug 1010716", url: "https://bugzilla.suse.com/1010716", }, { category: "self", summary: "SUSE Bug 1011685", url: "https://bugzilla.suse.com/1011685", }, { category: "self", summary: "SUSE Bug 1011820", url: "https://bugzilla.suse.com/1011820", }, { category: "self", summary: "SUSE Bug 1012183", url: "https://bugzilla.suse.com/1012183", }, { category: "self", summary: "SUSE Bug 1012411", url: "https://bugzilla.suse.com/1012411", }, { category: "self", summary: "SUSE Bug 1012422", url: "https://bugzilla.suse.com/1012422", }, { category: "self", summary: "SUSE Bug 1012832", url: "https://bugzilla.suse.com/1012832", }, { category: "self", summary: "SUSE Bug 1012851", url: "https://bugzilla.suse.com/1012851", }, { category: "self", summary: "SUSE Bug 1012852", url: "https://bugzilla.suse.com/1012852", }, { category: "self", summary: "SUSE Bug 1012917", url: "https://bugzilla.suse.com/1012917", }, { category: "self", summary: "SUSE Bug 1013018", url: "https://bugzilla.suse.com/1013018", }, { category: "self", summary: "SUSE Bug 1013038", url: "https://bugzilla.suse.com/1013038", }, { category: "self", summary: "SUSE Bug 1013042", url: "https://bugzilla.suse.com/1013042", }, { category: "self", summary: "SUSE Bug 1013070", url: "https://bugzilla.suse.com/1013070", }, { category: "self", summary: "SUSE Bug 1013531", url: "https://bugzilla.suse.com/1013531", }, { category: "self", summary: "SUSE Bug 1013542", url: "https://bugzilla.suse.com/1013542", }, { category: "self", summary: "SUSE Bug 1014410", url: "https://bugzilla.suse.com/1014410", }, { category: "self", summary: "SUSE Bug 1014454", url: "https://bugzilla.suse.com/1014454", }, { category: "self", summary: "SUSE Bug 1014746", url: "https://bugzilla.suse.com/1014746", }, { category: "self", summary: "SUSE Bug 1015561", url: "https://bugzilla.suse.com/1015561", }, { category: "self", summary: "SUSE Bug 1015752", url: "https://bugzilla.suse.com/1015752", }, { category: "self", summary: "SUSE Bug 1015760", url: "https://bugzilla.suse.com/1015760", }, { category: "self", summary: "SUSE Bug 1015796", url: "https://bugzilla.suse.com/1015796", }, { category: "self", summary: "SUSE Bug 1015803", url: "https://bugzilla.suse.com/1015803", }, { category: "self", summary: "SUSE Bug 1015817", url: "https://bugzilla.suse.com/1015817", }, { category: "self", summary: "SUSE Bug 1015828", url: "https://bugzilla.suse.com/1015828", }, { category: "self", summary: "SUSE Bug 1015844", url: "https://bugzilla.suse.com/1015844", }, { category: "self", summary: "SUSE Bug 1015848", url: "https://bugzilla.suse.com/1015848", }, { category: "self", summary: "SUSE Bug 1015878", url: "https://bugzilla.suse.com/1015878", }, { category: "self", summary: "SUSE Bug 1015932", url: "https://bugzilla.suse.com/1015932", }, { category: "self", summary: "SUSE Bug 1016320", url: "https://bugzilla.suse.com/1016320", }, { category: "self", summary: "SUSE Bug 1016505", url: "https://bugzilla.suse.com/1016505", }, { category: "self", summary: "SUSE Bug 1016520", url: "https://bugzilla.suse.com/1016520", }, { category: "self", summary: "SUSE Bug 1016668", url: "https://bugzilla.suse.com/1016668", }, { category: "self", summary: "SUSE Bug 1016688", url: "https://bugzilla.suse.com/1016688", }, { category: "self", summary: "SUSE Bug 1016824", url: "https://bugzilla.suse.com/1016824", }, { category: "self", summary: "SUSE Bug 1016831", url: "https://bugzilla.suse.com/1016831", }, { category: "self", summary: "SUSE Bug 1017686", url: "https://bugzilla.suse.com/1017686", }, { category: "self", summary: "SUSE Bug 1017710", url: "https://bugzilla.suse.com/1017710", }, { category: "self", summary: "SUSE Bug 1019079", url: "https://bugzilla.suse.com/1019079", }, { category: "self", summary: "SUSE Bug 1019148", url: "https://bugzilla.suse.com/1019148", }, { category: "self", summary: "SUSE Bug 1019165", url: "https://bugzilla.suse.com/1019165", }, { category: "self", summary: "SUSE Bug 1019348", url: "https://bugzilla.suse.com/1019348", }, { category: "self", summary: "SUSE Bug 1019783", url: "https://bugzilla.suse.com/1019783", }, { category: "self", summary: "SUSE Bug 1020214", url: "https://bugzilla.suse.com/1020214", }, { category: "self", summary: "SUSE Bug 1021258", url: "https://bugzilla.suse.com/1021258", }, { category: "self", summary: "SUSE Bug 748806", url: "https://bugzilla.suse.com/748806", }, { category: "self", summary: "SUSE Bug 786036", url: "https://bugzilla.suse.com/786036", }, { category: "self", summary: "SUSE Bug 790588", url: "https://bugzilla.suse.com/790588", }, { category: "self", summary: "SUSE Bug 795297", url: "https://bugzilla.suse.com/795297", }, { category: "self", summary: "SUSE Bug 800999", url: "https://bugzilla.suse.com/800999", }, { category: "self", summary: "SUSE Bug 821612", url: "https://bugzilla.suse.com/821612", }, { category: "self", summary: "SUSE Bug 824171", url: "https://bugzilla.suse.com/824171", }, { category: "self", summary: "SUSE Bug 851603", url: "https://bugzilla.suse.com/851603", }, { category: "self", summary: "SUSE Bug 853052", url: "https://bugzilla.suse.com/853052", }, { category: "self", summary: "SUSE Bug 871728", url: "https://bugzilla.suse.com/871728", }, { category: "self", summary: "SUSE Bug 901809", url: "https://bugzilla.suse.com/901809", }, { category: "self", summary: "SUSE Bug 909350", url: "https://bugzilla.suse.com/909350", }, { category: "self", summary: "SUSE Bug 909491", url: "https://bugzilla.suse.com/909491", }, { category: "self", summary: "SUSE Bug 913387", url: "https://bugzilla.suse.com/913387", }, { category: "self", summary: "SUSE Bug 914939", url: "https://bugzilla.suse.com/914939", }, { category: "self", summary: "SUSE Bug 919382", url: "https://bugzilla.suse.com/919382", }, { category: "self", summary: "SUSE Bug 924708", url: "https://bugzilla.suse.com/924708", }, { category: "self", summary: "SUSE Bug 925065", url: "https://bugzilla.suse.com/925065", }, { category: "self", summary: "SUSE Bug 953233", url: "https://bugzilla.suse.com/953233", }, { category: "self", summary: "SUSE Bug 961589", url: "https://bugzilla.suse.com/961589", }, { category: "self", summary: "SUSE Bug 962846", url: "https://bugzilla.suse.com/962846", }, { category: "self", summary: "SUSE Bug 969340", url: "https://bugzilla.suse.com/969340", }, { category: "self", summary: "SUSE Bug 973691", url: "https://bugzilla.suse.com/973691", }, { category: "self", summary: "SUSE Bug 987333", url: "https://bugzilla.suse.com/987333", }, { category: "self", summary: "SUSE Bug 987576", url: "https://bugzilla.suse.com/987576", }, { category: "self", summary: "SUSE Bug 989152", url: "https://bugzilla.suse.com/989152", }, { category: "self", summary: "SUSE Bug 989680", url: "https://bugzilla.suse.com/989680", }, { category: "self", summary: "SUSE Bug 989896", url: "https://bugzilla.suse.com/989896", }, { category: "self", summary: "SUSE Bug 990245", url: "https://bugzilla.suse.com/990245", }, { category: "self", summary: "SUSE Bug 992991", url: "https://bugzilla.suse.com/992991", }, { category: "self", summary: "SUSE Bug 993739", url: "https://bugzilla.suse.com/993739", }, { category: "self", summary: "SUSE Bug 993832", url: "https://bugzilla.suse.com/993832", }, { category: "self", summary: "SUSE Bug 996541", url: "https://bugzilla.suse.com/996541", }, { category: "self", summary: "SUSE Bug 996557", url: "https://bugzilla.suse.com/996557", }, { category: "self", summary: "SUSE Bug 997401", url: "https://bugzilla.suse.com/997401", }, { category: "self", summary: "SUSE Bug 999101", url: "https://bugzilla.suse.com/999101", }, { category: "self", summary: "SUSE CVE CVE-2004-0230 page", url: "https://www.suse.com/security/cve/CVE-2004-0230/", }, { category: "self", summary: "SUSE CVE CVE-2012-6704 page", url: "https://www.suse.com/security/cve/CVE-2012-6704/", }, { category: "self", summary: "SUSE CVE CVE-2013-6368 page", url: "https://www.suse.com/security/cve/CVE-2013-6368/", }, { category: "self", summary: "SUSE CVE CVE-2015-1350 page", url: "https://www.suse.com/security/cve/CVE-2015-1350/", }, { category: "self", summary: "SUSE CVE CVE-2015-8962 page", url: "https://www.suse.com/security/cve/CVE-2015-8962/", }, { category: "self", summary: "SUSE CVE CVE-2015-8964 page", url: "https://www.suse.com/security/cve/CVE-2015-8964/", }, { category: "self", summary: "SUSE CVE CVE-2016-10088 page", url: "https://www.suse.com/security/cve/CVE-2016-10088/", }, { category: "self", summary: "SUSE CVE CVE-2016-5696 page", url: "https://www.suse.com/security/cve/CVE-2016-5696/", }, { category: "self", summary: "SUSE CVE CVE-2016-7910 page", url: "https://www.suse.com/security/cve/CVE-2016-7910/", }, { category: "self", summary: "SUSE CVE CVE-2016-7911 page", url: "https://www.suse.com/security/cve/CVE-2016-7911/", }, { category: "self", summary: "SUSE CVE CVE-2016-7916 page", url: "https://www.suse.com/security/cve/CVE-2016-7916/", }, { category: "self", summary: "SUSE CVE CVE-2016-8399 page", url: "https://www.suse.com/security/cve/CVE-2016-8399/", }, { category: "self", summary: "SUSE CVE CVE-2016-8632 page", url: "https://www.suse.com/security/cve/CVE-2016-8632/", }, { category: "self", summary: "SUSE CVE CVE-2016-8633 page", url: "https://www.suse.com/security/cve/CVE-2016-8633/", }, { category: "self", summary: "SUSE CVE CVE-2016-8646 page", url: "https://www.suse.com/security/cve/CVE-2016-8646/", }, { category: "self", summary: "SUSE CVE CVE-2016-9555 page", url: "https://www.suse.com/security/cve/CVE-2016-9555/", }, { category: "self", summary: "SUSE CVE CVE-2016-9685 page", url: "https://www.suse.com/security/cve/CVE-2016-9685/", }, { category: "self", summary: "SUSE CVE CVE-2016-9756 page", url: "https://www.suse.com/security/cve/CVE-2016-9756/", }, { category: "self", summary: "SUSE CVE CVE-2016-9793 page", url: "https://www.suse.com/security/cve/CVE-2016-9793/", }, { category: "self", summary: "SUSE CVE CVE-2017-5551 page", url: "https://www.suse.com/security/cve/CVE-2017-5551/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2017-02-09T15:37:43Z", generator: { date: "2017-02-09T15:37:43Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:0437-1", initial_release_date: "2017-02-09T15:37:43Z", revision_history: [ { date: "2017-02-09T15:37:43Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-default-3.0.101-94.1.i586", product: { name: "kernel-default-3.0.101-94.1.i586", product_id: "kernel-default-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-94.1.i586", product: { name: "kernel-default-base-3.0.101-94.1.i586", product_id: "kernel-default-base-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-94.1.i586", product: { name: "kernel-default-devel-3.0.101-94.1.i586", product_id: "kernel-default-devel-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-94.1.i586", product: { name: "kernel-ec2-3.0.101-94.1.i586", product_id: "kernel-ec2-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-94.1.i586", product: { name: "kernel-ec2-base-3.0.101-94.1.i586", product_id: "kernel-ec2-base-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-94.1.i586", product: { name: "kernel-ec2-devel-3.0.101-94.1.i586", product_id: "kernel-ec2-devel-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-pae-3.0.101-94.1.i586", product: { name: "kernel-pae-3.0.101-94.1.i586", product_id: "kernel-pae-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-pae-base-3.0.101-94.1.i586", product: { name: "kernel-pae-base-3.0.101-94.1.i586", product_id: "kernel-pae-base-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-pae-devel-3.0.101-94.1.i586", product: { name: "kernel-pae-devel-3.0.101-94.1.i586", product_id: "kernel-pae-devel-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-source-3.0.101-94.1.i586", product: { name: "kernel-source-3.0.101-94.1.i586", product_id: "kernel-source-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-syms-3.0.101-94.1.i586", product: { name: "kernel-syms-3.0.101-94.1.i586", product_id: "kernel-syms-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-trace-3.0.101-94.1.i586", product: { name: "kernel-trace-3.0.101-94.1.i586", product_id: "kernel-trace-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-94.1.i586", product: { name: "kernel-trace-base-3.0.101-94.1.i586", product_id: "kernel-trace-base-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-94.1.i586", product: { name: "kernel-trace-devel-3.0.101-94.1.i586", product_id: "kernel-trace-devel-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-xen-3.0.101-94.1.i586", product: { name: "kernel-xen-3.0.101-94.1.i586", product_id: "kernel-xen-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-94.1.i586", product: { name: "kernel-xen-base-3.0.101-94.1.i586", product_id: "kernel-xen-base-3.0.101-94.1.i586", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-94.1.i586", product: { name: "kernel-xen-devel-3.0.101-94.1.i586", product_id: "kernel-xen-devel-3.0.101-94.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-94.1.ia64", product: { name: "kernel-default-3.0.101-94.1.ia64", product_id: "kernel-default-3.0.101-94.1.ia64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-94.1.ia64", product: { name: "kernel-default-base-3.0.101-94.1.ia64", product_id: "kernel-default-base-3.0.101-94.1.ia64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-94.1.ia64", product: { name: "kernel-default-devel-3.0.101-94.1.ia64", product_id: "kernel-default-devel-3.0.101-94.1.ia64", }, }, { category: "product_version", name: "kernel-source-3.0.101-94.1.ia64", product: { name: "kernel-source-3.0.101-94.1.ia64", product_id: "kernel-source-3.0.101-94.1.ia64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-94.1.ia64", product: { name: "kernel-syms-3.0.101-94.1.ia64", product_id: "kernel-syms-3.0.101-94.1.ia64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-94.1.ia64", product: { name: "kernel-trace-3.0.101-94.1.ia64", product_id: "kernel-trace-3.0.101-94.1.ia64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-94.1.ia64", product: { name: "kernel-trace-base-3.0.101-94.1.ia64", product_id: "kernel-trace-base-3.0.101-94.1.ia64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-94.1.ia64", product: { name: "kernel-trace-devel-3.0.101-94.1.ia64", product_id: "kernel-trace-devel-3.0.101-94.1.ia64", }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "kernel-docs-3.0.101-94.2.noarch", product: { name: "kernel-docs-3.0.101-94.2.noarch", product_id: "kernel-docs-3.0.101-94.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-bigmem-3.0.101-94.1.ppc64", product: { name: "kernel-bigmem-3.0.101-94.1.ppc64", product_id: "kernel-bigmem-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-bigmem-base-3.0.101-94.1.ppc64", product: { name: "kernel-bigmem-base-3.0.101-94.1.ppc64", product_id: "kernel-bigmem-base-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-bigmem-devel-3.0.101-94.1.ppc64", product: { name: "kernel-bigmem-devel-3.0.101-94.1.ppc64", product_id: "kernel-bigmem-devel-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-default-3.0.101-94.1.ppc64", product: { name: "kernel-default-3.0.101-94.1.ppc64", product_id: "kernel-default-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-94.1.ppc64", product: { name: "kernel-default-base-3.0.101-94.1.ppc64", product_id: "kernel-default-base-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-94.1.ppc64", product: { name: "kernel-default-devel-3.0.101-94.1.ppc64", product_id: "kernel-default-devel-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-ppc64-3.0.101-94.1.ppc64", product: { name: "kernel-ppc64-3.0.101-94.1.ppc64", product_id: "kernel-ppc64-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-ppc64-base-3.0.101-94.1.ppc64", product: { name: "kernel-ppc64-base-3.0.101-94.1.ppc64", product_id: "kernel-ppc64-base-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-ppc64-devel-3.0.101-94.1.ppc64", product: { name: "kernel-ppc64-devel-3.0.101-94.1.ppc64", product_id: "kernel-ppc64-devel-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-source-3.0.101-94.1.ppc64", product: { name: "kernel-source-3.0.101-94.1.ppc64", product_id: "kernel-source-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-94.1.ppc64", product: { name: "kernel-syms-3.0.101-94.1.ppc64", product_id: "kernel-syms-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-94.1.ppc64", product: { name: "kernel-trace-3.0.101-94.1.ppc64", product_id: "kernel-trace-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-94.1.ppc64", product: { name: "kernel-trace-base-3.0.101-94.1.ppc64", product_id: "kernel-trace-base-3.0.101-94.1.ppc64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-94.1.ppc64", product: { name: "kernel-trace-devel-3.0.101-94.1.ppc64", product_id: "kernel-trace-devel-3.0.101-94.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-94.1.s390x", product: { name: "kernel-default-3.0.101-94.1.s390x", product_id: "kernel-default-3.0.101-94.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-94.1.s390x", product: { name: "kernel-default-base-3.0.101-94.1.s390x", product_id: "kernel-default-base-3.0.101-94.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-94.1.s390x", product: { name: "kernel-default-devel-3.0.101-94.1.s390x", product_id: "kernel-default-devel-3.0.101-94.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.0.101-94.1.s390x", product: { name: "kernel-default-man-3.0.101-94.1.s390x", product_id: "kernel-default-man-3.0.101-94.1.s390x", }, }, { category: "product_version", name: "kernel-source-3.0.101-94.1.s390x", product: { name: "kernel-source-3.0.101-94.1.s390x", product_id: "kernel-source-3.0.101-94.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.0.101-94.1.s390x", product: { name: "kernel-syms-3.0.101-94.1.s390x", product_id: "kernel-syms-3.0.101-94.1.s390x", }, }, { category: "product_version", name: "kernel-trace-3.0.101-94.1.s390x", product: { name: "kernel-trace-3.0.101-94.1.s390x", product_id: "kernel-trace-3.0.101-94.1.s390x", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-94.1.s390x", product: { name: "kernel-trace-base-3.0.101-94.1.s390x", product_id: "kernel-trace-base-3.0.101-94.1.s390x", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-94.1.s390x", product: { name: "kernel-trace-devel-3.0.101-94.1.s390x", product_id: "kernel-trace-devel-3.0.101-94.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-94.1.x86_64", product: { name: "kernel-default-3.0.101-94.1.x86_64", product_id: "kernel-default-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-94.1.x86_64", product: { name: "kernel-default-base-3.0.101-94.1.x86_64", product_id: "kernel-default-base-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-94.1.x86_64", product: { name: "kernel-default-devel-3.0.101-94.1.x86_64", product_id: "kernel-default-devel-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-94.1.x86_64", product: { name: "kernel-ec2-3.0.101-94.1.x86_64", product_id: "kernel-ec2-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-94.1.x86_64", product: { name: "kernel-ec2-base-3.0.101-94.1.x86_64", product_id: "kernel-ec2-base-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-94.1.x86_64", product: { name: "kernel-ec2-devel-3.0.101-94.1.x86_64", product_id: "kernel-ec2-devel-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-source-3.0.101-94.1.x86_64", product: { name: "kernel-source-3.0.101-94.1.x86_64", product_id: "kernel-source-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-94.1.x86_64", product: { name: "kernel-syms-3.0.101-94.1.x86_64", product_id: "kernel-syms-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-94.1.x86_64", product: { name: "kernel-trace-3.0.101-94.1.x86_64", product_id: "kernel-trace-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-94.1.x86_64", product: { name: "kernel-trace-base-3.0.101-94.1.x86_64", product_id: "kernel-trace-base-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-94.1.x86_64", product: { name: "kernel-trace-devel-3.0.101-94.1.x86_64", product_id: "kernel-trace-devel-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.0.101-94.1.x86_64", product: { name: "kernel-xen-3.0.101-94.1.x86_64", product_id: "kernel-xen-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-94.1.x86_64", product: { name: "kernel-xen-base-3.0.101-94.1.x86_64", product_id: "kernel-xen-base-3.0.101-94.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-94.1.x86_64", product: { name: "kernel-xen-devel-3.0.101-94.1.x86_64", product_id: "kernel-xen-devel-3.0.101-94.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 11 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4", product_identification_helper: { cpe: "cpe:/a:suse:sle-sdk:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4", product: { name: "SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-docs-3.0.101-94.2.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", }, product_reference: "kernel-docs-3.0.101-94.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", }, product_reference: "kernel-bigmem-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", }, product_reference: "kernel-bigmem-base-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", }, product_reference: "kernel-bigmem-devel-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", }, product_reference: "kernel-default-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", }, product_reference: "kernel-default-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", }, product_reference: "kernel-default-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", }, product_reference: "kernel-default-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", }, product_reference: "kernel-default-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", }, product_reference: "kernel-default-base-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", }, product_reference: "kernel-default-base-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", }, product_reference: "kernel-default-base-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", }, product_reference: "kernel-default-base-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", }, product_reference: "kernel-default-devel-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", }, product_reference: "kernel-default-devel-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", }, product_reference: "kernel-default-devel-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", }, product_reference: "kernel-default-devel-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", }, product_reference: "kernel-default-man-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", }, product_reference: "kernel-ec2-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", }, product_reference: "kernel-ec2-base-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", }, product_reference: "kernel-ec2-devel-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", }, product_reference: "kernel-pae-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", }, product_reference: "kernel-pae-base-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", }, product_reference: "kernel-pae-devel-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", }, product_reference: "kernel-ppc64-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", }, product_reference: "kernel-ppc64-base-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", }, product_reference: "kernel-ppc64-devel-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", }, product_reference: "kernel-source-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", }, product_reference: "kernel-source-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", }, product_reference: "kernel-source-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", }, product_reference: "kernel-source-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", }, product_reference: "kernel-source-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", }, product_reference: "kernel-syms-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", }, product_reference: "kernel-syms-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", }, product_reference: "kernel-syms-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", }, product_reference: "kernel-syms-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", }, product_reference: "kernel-syms-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", }, product_reference: "kernel-trace-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", }, product_reference: "kernel-trace-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", }, product_reference: "kernel-trace-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", }, product_reference: "kernel-trace-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", }, product_reference: "kernel-trace-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", }, product_reference: "kernel-trace-base-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", }, product_reference: "kernel-trace-base-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", }, product_reference: "kernel-trace-base-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", }, product_reference: "kernel-trace-base-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", }, product_reference: "kernel-trace-devel-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", }, product_reference: "kernel-trace-devel-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", }, product_reference: "kernel-trace-devel-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", }, product_reference: "kernel-trace-devel-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", }, product_reference: "kernel-xen-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", }, product_reference: "kernel-xen-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", }, product_reference: "kernel-xen-base-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", }, product_reference: "kernel-xen-devel-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", }, product_reference: "kernel-bigmem-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", }, product_reference: "kernel-bigmem-base-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", }, product_reference: "kernel-bigmem-devel-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", }, product_reference: "kernel-default-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", }, product_reference: "kernel-default-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", }, product_reference: "kernel-default-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", }, product_reference: "kernel-default-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", }, product_reference: "kernel-default-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", }, product_reference: "kernel-default-base-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", }, product_reference: "kernel-default-base-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", }, product_reference: "kernel-default-base-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", }, product_reference: "kernel-default-base-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", }, product_reference: "kernel-default-devel-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", }, product_reference: "kernel-default-devel-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", }, product_reference: "kernel-default-devel-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", }, product_reference: "kernel-default-devel-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", }, product_reference: "kernel-default-man-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", }, product_reference: "kernel-ec2-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", }, product_reference: "kernel-ec2-base-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", }, product_reference: "kernel-ec2-devel-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", }, product_reference: "kernel-pae-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", }, product_reference: "kernel-pae-base-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", }, product_reference: "kernel-pae-devel-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", }, product_reference: "kernel-ppc64-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", }, product_reference: "kernel-ppc64-base-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", }, product_reference: "kernel-ppc64-devel-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", }, product_reference: "kernel-source-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", }, product_reference: "kernel-source-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", }, product_reference: "kernel-source-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", }, product_reference: "kernel-source-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", }, product_reference: "kernel-source-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", }, product_reference: "kernel-syms-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", }, product_reference: "kernel-syms-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", }, product_reference: "kernel-syms-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", }, product_reference: "kernel-syms-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", }, product_reference: "kernel-syms-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", }, product_reference: "kernel-trace-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", }, product_reference: "kernel-trace-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", }, product_reference: "kernel-trace-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", }, product_reference: "kernel-trace-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", }, product_reference: "kernel-trace-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", }, product_reference: "kernel-trace-base-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", }, product_reference: "kernel-trace-base-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", }, product_reference: "kernel-trace-base-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", }, product_reference: "kernel-trace-base-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", }, product_reference: "kernel-trace-devel-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", }, product_reference: "kernel-trace-devel-3.0.101-94.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", }, product_reference: "kernel-trace-devel-3.0.101-94.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", }, product_reference: "kernel-trace-devel-3.0.101-94.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", }, product_reference: "kernel-xen-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", }, product_reference: "kernel-xen-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", }, product_reference: "kernel-xen-base-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", }, product_reference: "kernel-xen-devel-3.0.101-94.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-94.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2004-0230", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2004-0230", }, ], notes: [ { category: "general", text: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2004-0230", url: "https://www.suse.com/security/cve/CVE-2004-0230", }, { category: "external", summary: "SUSE Bug 1184394 for CVE-2004-0230", url: "https://bugzilla.suse.com/1184394", }, { category: "external", summary: "SUSE Bug 1198501 for CVE-2004-0230", url: "https://bugzilla.suse.com/1198501", }, { category: "external", summary: "SUSE Bug 1206598 for CVE-2004-0230", url: "https://bugzilla.suse.com/1206598", }, { category: "external", summary: "SUSE Bug 969340 for CVE-2004-0230", url: "https://bugzilla.suse.com/969340", }, { category: "external", summary: "SUSE Bug 989152 for CVE-2004-0230", url: "https://bugzilla.suse.com/989152", }, { category: "external", summary: "SUSE Bug 992991 for CVE-2004-0230", url: "https://bugzilla.suse.com/992991", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2004-0230", }, { cve: "CVE-2012-6704", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6704", }, ], notes: [ { category: "general", text: "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2012-6704", url: "https://www.suse.com/security/cve/CVE-2012-6704", }, { category: "external", summary: "SUSE Bug 1013531 for CVE-2012-6704", url: "https://bugzilla.suse.com/1013531", }, { category: "external", summary: "SUSE Bug 1013542 for CVE-2012-6704", url: "https://bugzilla.suse.com/1013542", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2012-6704", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2012-6704", }, { cve: "CVE-2013-6368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-6368", }, ], notes: [ { category: "general", text: "The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2013-6368", url: "https://www.suse.com/security/cve/CVE-2013-6368", }, { category: "external", summary: "SUSE Bug 853052 for CVE-2013-6368", url: "https://bugzilla.suse.com/853052", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2013-6368", }, { cve: "CVE-2015-1350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1350", }, ], notes: [ { category: "general", text: "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2015-1350", url: "https://www.suse.com/security/cve/CVE-2015-1350", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2015-1350", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 914939 for CVE-2015-1350", url: "https://bugzilla.suse.com/914939", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2015-1350", }, { cve: "CVE-2015-8962", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8962", }, ], notes: [ { category: "general", text: "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2015-8962", url: "https://www.suse.com/security/cve/CVE-2015-8962", }, { category: "external", summary: "SUSE Bug 1010501 for CVE-2015-8962", url: "https://bugzilla.suse.com/1010501", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2015-8962", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2015-8962", }, { cve: "CVE-2015-8964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8964", }, ], notes: [ { category: "general", text: "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2015-8964", url: "https://www.suse.com/security/cve/CVE-2015-8964", }, { category: "external", summary: "SUSE Bug 1010507 for CVE-2015-8964", url: "https://bugzilla.suse.com/1010507", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2015-8964", }, { cve: "CVE-2016-10088", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10088", }, ], notes: [ { category: "general", text: "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-10088", url: "https://www.suse.com/security/cve/CVE-2016-10088", }, { category: "external", summary: "SUSE Bug 1013604 for CVE-2016-10088", url: "https://bugzilla.suse.com/1013604", }, { category: "external", summary: "SUSE Bug 1014271 for CVE-2016-10088", url: "https://bugzilla.suse.com/1014271", }, { category: "external", summary: "SUSE Bug 1017710 for CVE-2016-10088", url: "https://bugzilla.suse.com/1017710", }, { category: "external", summary: "SUSE Bug 1019079 for CVE-2016-10088", url: "https://bugzilla.suse.com/1019079", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-10088", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "important", }, ], title: "CVE-2016-10088", }, { cve: "CVE-2016-5696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5696", }, ], notes: [ { category: "general", text: "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-5696", url: "https://www.suse.com/security/cve/CVE-2016-5696", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-5696", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1175721 for CVE-2016-5696", url: "https://bugzilla.suse.com/1175721", }, { category: "external", summary: "SUSE Bug 989152 for CVE-2016-5696", url: "https://bugzilla.suse.com/989152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2016-5696", }, { cve: "CVE-2016-7910", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7910", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-7910", url: "https://www.suse.com/security/cve/CVE-2016-7910", }, { category: "external", summary: "SUSE Bug 1010716 for CVE-2016-7910", url: "https://bugzilla.suse.com/1010716", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7910", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 1196722 for CVE-2016-7910", url: "https://bugzilla.suse.com/1196722", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2016-7910", }, { cve: "CVE-2016-7911", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7911", }, ], notes: [ { category: "general", text: "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-7911", url: "https://www.suse.com/security/cve/CVE-2016-7911", }, { category: "external", summary: "SUSE Bug 1010711 for CVE-2016-7911", url: "https://bugzilla.suse.com/1010711", }, { category: "external", summary: "SUSE Bug 1010713 for CVE-2016-7911", url: "https://bugzilla.suse.com/1010713", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7911", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2016-7911", }, { cve: "CVE-2016-7916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7916", }, ], notes: [ { category: "general", text: "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-7916", url: "https://www.suse.com/security/cve/CVE-2016-7916", }, { category: "external", summary: "SUSE Bug 1010467 for CVE-2016-7916", url: "https://bugzilla.suse.com/1010467", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2016-7916", }, { cve: "CVE-2016-8399", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8399", }, ], notes: [ { category: "general", text: "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-8399", url: "https://www.suse.com/security/cve/CVE-2016-8399", }, { category: "external", summary: "SUSE Bug 1014746 for CVE-2016-8399", url: "https://bugzilla.suse.com/1014746", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-8399", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2016-8399", }, { cve: "CVE-2016-8632", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8632", }, ], notes: [ { category: "general", text: "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-8632", url: "https://www.suse.com/security/cve/CVE-2016-8632", }, { category: "external", summary: "SUSE Bug 1008831 for CVE-2016-8632", url: "https://bugzilla.suse.com/1008831", }, { category: "external", summary: "SUSE Bug 1012852 for CVE-2016-8632", url: "https://bugzilla.suse.com/1012852", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-8632", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2016-8632", }, { cve: "CVE-2016-8633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8633", }, ], notes: [ { category: "general", text: "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-8633", url: "https://www.suse.com/security/cve/CVE-2016-8633", }, { category: "external", summary: "SUSE Bug 1008833 for CVE-2016-8633", url: "https://bugzilla.suse.com/1008833", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2016-8633", }, { cve: "CVE-2016-8646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8646", }, ], notes: [ { category: "general", text: "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-8646", url: "https://www.suse.com/security/cve/CVE-2016-8646", }, { category: "external", summary: "SUSE Bug 1010150 for CVE-2016-8646", url: "https://bugzilla.suse.com/1010150", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2016-8646", }, { cve: "CVE-2016-9555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9555", }, ], notes: [ { category: "general", text: "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-9555", url: "https://www.suse.com/security/cve/CVE-2016-9555", }, { category: "external", summary: "SUSE Bug 1011685 for CVE-2016-9555", url: "https://bugzilla.suse.com/1011685", }, { category: "external", summary: "SUSE Bug 1012183 for CVE-2016-9555", url: "https://bugzilla.suse.com/1012183", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-9555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "important", }, ], title: "CVE-2016-9555", }, { cve: "CVE-2016-9685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9685", }, ], notes: [ { category: "general", text: "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-9685", url: "https://www.suse.com/security/cve/CVE-2016-9685", }, { category: "external", summary: "SUSE Bug 1012832 for CVE-2016-9685", url: "https://bugzilla.suse.com/1012832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "low", }, ], title: "CVE-2016-9685", }, { cve: "CVE-2016-9756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9756", }, ], notes: [ { category: "general", text: "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-9756", url: "https://www.suse.com/security/cve/CVE-2016-9756", }, { category: "external", summary: "SUSE Bug 1013038 for CVE-2016-9756", url: "https://bugzilla.suse.com/1013038", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2016-9756", }, { cve: "CVE-2016-9793", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9793", }, ], notes: [ { category: "general", text: "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-9793", url: "https://www.suse.com/security/cve/CVE-2016-9793", }, { category: "external", summary: "SUSE Bug 1013531 for CVE-2016-9793", url: "https://bugzilla.suse.com/1013531", }, { category: "external", summary: "SUSE Bug 1013542 for CVE-2016-9793", url: "https://bugzilla.suse.com/1013542", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-9793", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "moderate", }, ], title: "CVE-2016-9793", }, { cve: "CVE-2017-5551", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5551", }, ], notes: [ { category: "general", text: "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-5551", url: "https://www.suse.com/security/cve/CVE-2017-5551", }, { category: "external", summary: "SUSE Bug 1021258 for CVE-2017-5551", url: "https://bugzilla.suse.com/1021258", }, { category: "external", summary: "SUSE Bug 995968 for CVE-2017-5551", url: "https://bugzilla.suse.com/995968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch", ], }, ], threats: [ { category: "impact", date: "2017-02-09T15:37:43Z", details: "low", }, ], title: "CVE-2017-5551", }, ], }
suse-su-2017:0494-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that did not supply a key, related to the lrw_crypt function in crypto/lrw.c (bnc#1008374).\n- CVE-2017-5551: Clear S_ISGID on tmpfs when setting posix ACLs (bsc#1021258).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local malicious application to execute arbitrary code within the context of the kernel bnc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel in certain unusual hardware configurations allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux, when the GNU Compiler Collection (gcc) stack protector is enabled, used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file (bnc#994759).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n\nThe following non-security bugs were fixed:\n\n- Always include the git commit in KOTD builds. This allows us not to set it explicitly in builds submitted to the official distribution (bnc#821612, bnc#824171).\n- KVM: x86: SYSENTER emulation is broken (bsc#994618).\n- NFS: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).\n- NFS: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).\n- NFSv4: add flock_owner to open context (bnc#998689).\n- NFSv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- NFSv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- NFSv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- NFSv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).\n- SELinux: Fix possible NULL pointer dereference in selinux_inode_permission() (bsc#1012895).\n- USB: fix typo in wMaxPacketSize validation (bsc#991665).\n- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, among others).\n- __ptrace_may_access() should not deny sub-threads (bsc#1012851).\n- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).\n- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- include/linux/math64.h: add div64_ul() (bsc#996329).\n- kabi-fix for flock_owner addition (bsc#998689).\n- kabi: get back scsi_device.current_cmnd (bsc#935436).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kexec: add a kexec_crash_loaded() function (bsc#973691).\n- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).\n- powerpc: Add ability to build little endian kernels (bsc#967716).\n- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).\n- powerpc: Do not build assembly files with ABIv2 (bsc#967716).\n- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).\n- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).\n- powerpc: Fix error when cross building TAGS and cscope (bsc#967716).\n- powerpc: Make the vdso32 also build big-endian (bsc#967716).\n- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).\n- powerpc: Remove buggy 9-year-old test for binutils lower than 2.12.1 (bsc#967716).\n- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).\n- powerpc: dtc is required to build dtb files (bsc#967716).\n- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).\n- qlcnic: Schedule napi directly in netpoll (bsc#966826).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/config.sh: Set a fitting release string (bsc#997059)\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- s390/dasd: fix failfast for disconnected devices (bnc#961923, LTC#135138).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).\n- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).\n- scsi: remove current_cmnd field from struct scsi_device (bsc#935436). \n- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).\n- xfs: remove the deprecated nodelaylog option (bsc#992906).\n", title: "Description of the patch", }, { category: "details", text: "sleclo50sp3-linux-kernel-12992,sleman21-linux-kernel-12992,slemap21-linux-kernel-12992,sleposp3-linux-kernel-12992,slessp3-linux-kernel-12992,slexsp3-linux-kernel-12992", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0494-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:0494-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20170494-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:0494-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html", }, { category: "self", summary: "SUSE Bug 1001419", url: "https://bugzilla.suse.com/1001419", }, { category: "self", summary: "SUSE Bug 1002165", url: "https://bugzilla.suse.com/1002165", }, { category: "self", summary: "SUSE Bug 1003077", url: "https://bugzilla.suse.com/1003077", }, { category: "self", summary: "SUSE Bug 1003253", url: "https://bugzilla.suse.com/1003253", }, { category: "self", summary: "SUSE Bug 1003925", url: "https://bugzilla.suse.com/1003925", }, { category: "self", summary: "SUSE Bug 1004517", url: "https://bugzilla.suse.com/1004517", }, { category: "self", summary: "SUSE Bug 1007944", url: "https://bugzilla.suse.com/1007944", }, { category: "self", summary: "SUSE Bug 1008374", url: "https://bugzilla.suse.com/1008374", }, { category: "self", summary: "SUSE Bug 1008645", url: "https://bugzilla.suse.com/1008645", }, { category: "self", summary: "SUSE Bug 1008831", url: "https://bugzilla.suse.com/1008831", }, { category: "self", summary: "SUSE Bug 1008833", url: "https://bugzilla.suse.com/1008833", }, { category: "self", summary: "SUSE Bug 1008850", url: "https://bugzilla.suse.com/1008850", }, { category: "self", summary: "SUSE Bug 1009875", url: "https://bugzilla.suse.com/1009875", }, { category: "self", summary: "SUSE Bug 1010150", url: "https://bugzilla.suse.com/1010150", }, { category: "self", summary: "SUSE Bug 1010467", url: "https://bugzilla.suse.com/1010467", }, { category: "self", summary: "SUSE Bug 1010501", url: "https://bugzilla.suse.com/1010501", }, { category: "self", summary: "SUSE Bug 1010507", url: "https://bugzilla.suse.com/1010507", }, { category: "self", summary: "SUSE Bug 1010711", url: "https://bugzilla.suse.com/1010711", }, { category: "self", summary: "SUSE Bug 1010713", url: "https://bugzilla.suse.com/1010713", }, { category: "self", summary: "SUSE Bug 1010716", url: "https://bugzilla.suse.com/1010716", }, { category: "self", summary: "SUSE Bug 1011685", url: "https://bugzilla.suse.com/1011685", }, { category: "self", summary: "SUSE Bug 1011820", url: "https://bugzilla.suse.com/1011820", }, { category: "self", summary: "SUSE Bug 1012183", url: "https://bugzilla.suse.com/1012183", }, { category: "self", summary: "SUSE Bug 1012422", url: "https://bugzilla.suse.com/1012422", }, { category: "self", summary: "SUSE Bug 1012832", url: "https://bugzilla.suse.com/1012832", }, { category: "self", summary: "SUSE Bug 1012851", url: "https://bugzilla.suse.com/1012851", }, { category: "self", summary: "SUSE Bug 1012852", url: "https://bugzilla.suse.com/1012852", }, { category: "self", summary: "SUSE Bug 1012895", url: "https://bugzilla.suse.com/1012895", }, { category: "self", summary: "SUSE Bug 1013038", url: "https://bugzilla.suse.com/1013038", }, { category: "self", summary: "SUSE Bug 1013042", url: "https://bugzilla.suse.com/1013042", }, { category: "self", summary: "SUSE Bug 1013531", url: "https://bugzilla.suse.com/1013531", }, { category: "self", summary: "SUSE Bug 1013542", url: "https://bugzilla.suse.com/1013542", }, { category: "self", summary: "SUSE Bug 1014454", url: "https://bugzilla.suse.com/1014454", }, { category: "self", summary: "SUSE Bug 1014746", url: "https://bugzilla.suse.com/1014746", }, { category: "self", summary: "SUSE Bug 1015878", url: "https://bugzilla.suse.com/1015878", }, { category: "self", summary: "SUSE Bug 1017710", url: "https://bugzilla.suse.com/1017710", }, { category: "self", summary: "SUSE Bug 1018446", url: "https://bugzilla.suse.com/1018446", }, { category: "self", summary: "SUSE Bug 1019079", url: "https://bugzilla.suse.com/1019079", }, { category: "self", summary: "SUSE Bug 1019783", url: "https://bugzilla.suse.com/1019783", }, { category: "self", summary: "SUSE Bug 1021258", url: "https://bugzilla.suse.com/1021258", }, { category: "self", summary: "SUSE Bug 821612", url: "https://bugzilla.suse.com/821612", }, { category: "self", summary: "SUSE Bug 824171", url: "https://bugzilla.suse.com/824171", }, { category: "self", summary: "SUSE Bug 914939", url: "https://bugzilla.suse.com/914939", }, { category: "self", summary: "SUSE Bug 929141", url: "https://bugzilla.suse.com/929141", }, { category: "self", summary: "SUSE Bug 935436", url: "https://bugzilla.suse.com/935436", }, { category: "self", summary: "SUSE Bug 956514", url: "https://bugzilla.suse.com/956514", }, { category: "self", summary: "SUSE Bug 961923", url: "https://bugzilla.suse.com/961923", }, { category: "self", summary: "SUSE Bug 966826", url: "https://bugzilla.suse.com/966826", }, { category: "self", summary: "SUSE Bug 967716", url: "https://bugzilla.suse.com/967716", }, { category: "self", summary: "SUSE Bug 969340", url: "https://bugzilla.suse.com/969340", }, { category: "self", summary: "SUSE Bug 973691", url: "https://bugzilla.suse.com/973691", }, { category: "self", summary: "SUSE Bug 979595", url: "https://bugzilla.suse.com/979595", }, { category: "self", summary: "SUSE Bug 987576", url: "https://bugzilla.suse.com/987576", }, { category: "self", summary: "SUSE Bug 989152", url: "https://bugzilla.suse.com/989152", }, { category: "self", summary: "SUSE Bug 989261", url: "https://bugzilla.suse.com/989261", }, { category: "self", summary: "SUSE Bug 991665", url: "https://bugzilla.suse.com/991665", }, { category: "self", summary: "SUSE Bug 992566", url: "https://bugzilla.suse.com/992566", }, { category: "self", summary: "SUSE Bug 992569", url: "https://bugzilla.suse.com/992569", }, { category: "self", summary: "SUSE Bug 992906", url: "https://bugzilla.suse.com/992906", }, { category: "self", summary: "SUSE Bug 992991", url: "https://bugzilla.suse.com/992991", }, { category: "self", summary: "SUSE Bug 993890", url: "https://bugzilla.suse.com/993890", }, { category: "self", summary: "SUSE Bug 993891", url: "https://bugzilla.suse.com/993891", }, { category: "self", summary: "SUSE Bug 994296", url: "https://bugzilla.suse.com/994296", }, { category: "self", summary: "SUSE Bug 994618", url: "https://bugzilla.suse.com/994618", }, { category: "self", summary: "SUSE Bug 994759", url: "https://bugzilla.suse.com/994759", }, { category: "self", summary: "SUSE Bug 995968", url: "https://bugzilla.suse.com/995968", }, { category: "self", summary: "SUSE Bug 996329", url: "https://bugzilla.suse.com/996329", }, { category: "self", summary: "SUSE Bug 996541", url: "https://bugzilla.suse.com/996541", }, { category: "self", summary: "SUSE Bug 996557", url: "https://bugzilla.suse.com/996557", }, { category: "self", summary: "SUSE Bug 997059", url: "https://bugzilla.suse.com/997059", }, { category: "self", summary: "SUSE Bug 997401", url: "https://bugzilla.suse.com/997401", }, { category: "self", summary: "SUSE Bug 997708", url: "https://bugzilla.suse.com/997708", }, { category: "self", summary: "SUSE Bug 998689", url: "https://bugzilla.suse.com/998689", }, { category: "self", summary: "SUSE Bug 999932", url: "https://bugzilla.suse.com/999932", }, { category: "self", summary: "SUSE Bug 999943", url: "https://bugzilla.suse.com/999943", }, { category: "self", summary: "SUSE CVE CVE-2004-0230 page", url: "https://www.suse.com/security/cve/CVE-2004-0230/", }, { category: "self", summary: "SUSE CVE CVE-2012-6704 page", url: "https://www.suse.com/security/cve/CVE-2012-6704/", }, { category: "self", summary: "SUSE CVE CVE-2015-1350 page", url: "https://www.suse.com/security/cve/CVE-2015-1350/", }, { category: "self", summary: "SUSE CVE CVE-2015-8956 page", url: "https://www.suse.com/security/cve/CVE-2015-8956/", }, { category: "self", summary: "SUSE CVE CVE-2015-8962 page", url: "https://www.suse.com/security/cve/CVE-2015-8962/", }, { category: "self", summary: "SUSE CVE CVE-2015-8964 page", url: "https://www.suse.com/security/cve/CVE-2015-8964/", }, { category: "self", summary: "SUSE CVE CVE-2015-8970 page", url: "https://www.suse.com/security/cve/CVE-2015-8970/", }, { category: "self", summary: "SUSE CVE CVE-2016-0823 page", url: "https://www.suse.com/security/cve/CVE-2016-0823/", }, { category: "self", summary: "SUSE CVE CVE-2016-10088 page", url: "https://www.suse.com/security/cve/CVE-2016-10088/", }, { category: "self", summary: "SUSE CVE CVE-2016-3841 page", url: "https://www.suse.com/security/cve/CVE-2016-3841/", }, { category: "self", summary: "SUSE CVE CVE-2016-6828 page", url: "https://www.suse.com/security/cve/CVE-2016-6828/", }, { category: "self", summary: "SUSE CVE CVE-2016-7042 page", url: "https://www.suse.com/security/cve/CVE-2016-7042/", }, { category: "self", summary: "SUSE CVE CVE-2016-7097 page", url: "https://www.suse.com/security/cve/CVE-2016-7097/", }, { category: "self", summary: "SUSE CVE CVE-2016-7117 page", url: "https://www.suse.com/security/cve/CVE-2016-7117/", }, { category: "self", summary: "SUSE CVE CVE-2016-7425 page", url: "https://www.suse.com/security/cve/CVE-2016-7425/", }, { category: "self", summary: "SUSE CVE CVE-2016-7910 page", url: "https://www.suse.com/security/cve/CVE-2016-7910/", }, { category: "self", summary: "SUSE CVE CVE-2016-7911 page", url: "https://www.suse.com/security/cve/CVE-2016-7911/", }, { category: "self", summary: "SUSE CVE CVE-2016-7916 page", url: "https://www.suse.com/security/cve/CVE-2016-7916/", }, { category: "self", summary: "SUSE CVE CVE-2016-8399 page", url: "https://www.suse.com/security/cve/CVE-2016-8399/", }, { category: "self", summary: "SUSE CVE CVE-2016-8632 page", url: "https://www.suse.com/security/cve/CVE-2016-8632/", }, { category: "self", summary: "SUSE CVE CVE-2016-8633 page", url: "https://www.suse.com/security/cve/CVE-2016-8633/", }, { category: "self", summary: "SUSE CVE CVE-2016-8646 page", url: "https://www.suse.com/security/cve/CVE-2016-8646/", }, { category: "self", summary: "SUSE CVE CVE-2016-9555 page", url: "https://www.suse.com/security/cve/CVE-2016-9555/", }, { category: "self", summary: "SUSE CVE CVE-2016-9685 page", url: "https://www.suse.com/security/cve/CVE-2016-9685/", }, { category: "self", summary: "SUSE CVE CVE-2016-9756 page", url: "https://www.suse.com/security/cve/CVE-2016-9756/", }, { category: "self", summary: "SUSE CVE CVE-2016-9793 page", url: "https://www.suse.com/security/cve/CVE-2016-9793/", }, { category: "self", summary: "SUSE CVE CVE-2017-5551 page", url: "https://www.suse.com/security/cve/CVE-2017-5551/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2017-02-17T13:56:58Z", generator: { date: "2017-02-17T13:56:58Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:0494-1", initial_release_date: "2017-02-17T13:56:58Z", revision_history: [ { date: "2017-02-17T13:56:58Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-default-3.0.101-0.47.96.1.i586", product: { name: "kernel-default-3.0.101-0.47.96.1.i586", product_id: "kernel-default-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-0.47.96.1.i586", product: { name: "kernel-default-base-3.0.101-0.47.96.1.i586", product_id: "kernel-default-base-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-0.47.96.1.i586", product: { name: "kernel-default-devel-3.0.101-0.47.96.1.i586", product_id: "kernel-default-devel-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-0.47.96.1.i586", product: { name: "kernel-ec2-3.0.101-0.47.96.1.i586", product_id: "kernel-ec2-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-0.47.96.1.i586", product: { name: "kernel-ec2-base-3.0.101-0.47.96.1.i586", product_id: "kernel-ec2-base-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-0.47.96.1.i586", product: { name: "kernel-ec2-devel-3.0.101-0.47.96.1.i586", product_id: "kernel-ec2-devel-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-pae-3.0.101-0.47.96.1.i586", product: { name: "kernel-pae-3.0.101-0.47.96.1.i586", product_id: "kernel-pae-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-pae-base-3.0.101-0.47.96.1.i586", product: { name: "kernel-pae-base-3.0.101-0.47.96.1.i586", product_id: "kernel-pae-base-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-pae-devel-3.0.101-0.47.96.1.i586", product: { name: "kernel-pae-devel-3.0.101-0.47.96.1.i586", product_id: "kernel-pae-devel-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-source-3.0.101-0.47.96.1.i586", product: { name: "kernel-source-3.0.101-0.47.96.1.i586", product_id: "kernel-source-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-syms-3.0.101-0.47.96.1.i586", product: { name: "kernel-syms-3.0.101-0.47.96.1.i586", product_id: "kernel-syms-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-trace-3.0.101-0.47.96.1.i586", product: { name: "kernel-trace-3.0.101-0.47.96.1.i586", product_id: "kernel-trace-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-0.47.96.1.i586", product: { name: "kernel-trace-base-3.0.101-0.47.96.1.i586", product_id: "kernel-trace-base-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-0.47.96.1.i586", product: { name: "kernel-trace-devel-3.0.101-0.47.96.1.i586", product_id: "kernel-trace-devel-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-xen-3.0.101-0.47.96.1.i586", product: { name: "kernel-xen-3.0.101-0.47.96.1.i586", product_id: "kernel-xen-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-0.47.96.1.i586", product: { name: "kernel-xen-base-3.0.101-0.47.96.1.i586", product_id: "kernel-xen-base-3.0.101-0.47.96.1.i586", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-0.47.96.1.i586", product: { name: "kernel-xen-devel-3.0.101-0.47.96.1.i586", product_id: "kernel-xen-devel-3.0.101-0.47.96.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-0.47.96.1.s390x", product: { name: "kernel-default-3.0.101-0.47.96.1.s390x", product_id: "kernel-default-3.0.101-0.47.96.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-0.47.96.1.s390x", product: { name: "kernel-default-base-3.0.101-0.47.96.1.s390x", product_id: "kernel-default-base-3.0.101-0.47.96.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-0.47.96.1.s390x", product: { name: "kernel-default-devel-3.0.101-0.47.96.1.s390x", product_id: "kernel-default-devel-3.0.101-0.47.96.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.0.101-0.47.96.1.s390x", product: { name: "kernel-default-man-3.0.101-0.47.96.1.s390x", product_id: "kernel-default-man-3.0.101-0.47.96.1.s390x", }, }, { category: "product_version", name: "kernel-source-3.0.101-0.47.96.1.s390x", product: { name: "kernel-source-3.0.101-0.47.96.1.s390x", product_id: "kernel-source-3.0.101-0.47.96.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.0.101-0.47.96.1.s390x", product: { name: "kernel-syms-3.0.101-0.47.96.1.s390x", product_id: "kernel-syms-3.0.101-0.47.96.1.s390x", }, }, { category: "product_version", name: "kernel-trace-3.0.101-0.47.96.1.s390x", product: { name: "kernel-trace-3.0.101-0.47.96.1.s390x", product_id: "kernel-trace-3.0.101-0.47.96.1.s390x", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-0.47.96.1.s390x", product: { name: "kernel-trace-base-3.0.101-0.47.96.1.s390x", product_id: "kernel-trace-base-3.0.101-0.47.96.1.s390x", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-0.47.96.1.s390x", product: { name: "kernel-trace-devel-3.0.101-0.47.96.1.s390x", product_id: "kernel-trace-devel-3.0.101-0.47.96.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", product_id: "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", product_id: "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", product_id: "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-default-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-default-3.0.101-0.47.96.1.x86_64", product_id: "kernel-default-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-default-base-3.0.101-0.47.96.1.x86_64", product_id: "kernel-default-base-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-default-devel-3.0.101-0.47.96.1.x86_64", product_id: "kernel-default-devel-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-ec2-3.0.101-0.47.96.1.x86_64", product_id: "kernel-ec2-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", product_id: "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", product_id: "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-source-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-source-3.0.101-0.47.96.1.x86_64", product_id: "kernel-source-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-syms-3.0.101-0.47.96.1.x86_64", product_id: "kernel-syms-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-trace-3.0.101-0.47.96.1.x86_64", product_id: "kernel-trace-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-trace-base-3.0.101-0.47.96.1.x86_64", product_id: "kernel-trace-base-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", product_id: "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-xen-3.0.101-0.47.96.1.x86_64", product_id: "kernel-xen-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-xen-base-3.0.101-0.47.96.1.x86_64", product_id: "kernel-xen-base-3.0.101-0.47.96.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", product: { name: "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", product_id: "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 5", product: { name: "SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5", product_identification_helper: { cpe: "cpe:/o:suse:cloud:5", }, }, }, { category: "product_name", name: "SUSE Manager 2.1", product: { name: "SUSE Manager 2.1", product_id: "SUSE Manager 2.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:2.1", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 2.1", product: { name: "SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:2.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Point of Sale 11 SP3", product: { name: "SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-pos:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles_ltss:11:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-source-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-syms-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-default-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-default-base-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-default-devel-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-default-man-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-source-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-source-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-syms-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-syms-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-trace-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-trace-base-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.96.1.s390x as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-trace-devel-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager 2.1", product_id: "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-source-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-syms-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Manager Proxy 2.1", product_id: "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 2.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-default-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-default-base-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-default-devel-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-ec2-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-ec2-base-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-ec2-devel-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-pae-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-pae-base-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-pae-devel-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-source-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-syms-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-trace-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-trace-base-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-trace-devel-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-xen-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-xen-base-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-xen-devel-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-default-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-default-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-default-base-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-default-base-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-default-devel-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-default-devel-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-default-man-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-ec2-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-ec2-base-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-ec2-devel-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-pae-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-pae-base-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-pae-devel-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-source-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-source-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-source-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-syms-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-syms-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-syms-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-trace-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-trace-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-trace-base-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-trace-base-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-trace-devel-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.96.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", }, product_reference: "kernel-trace-devel-3.0.101-0.47.96.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-xen-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-xen-base-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-0.47.96.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", }, product_reference: "kernel-xen-devel-3.0.101-0.47.96.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-0.47.96.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-0.47.96.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2004-0230", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2004-0230", }, ], notes: [ { category: "general", text: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2004-0230", url: "https://www.suse.com/security/cve/CVE-2004-0230", }, { category: "external", summary: "SUSE Bug 1184394 for CVE-2004-0230", url: "https://bugzilla.suse.com/1184394", }, { category: "external", summary: "SUSE Bug 1198501 for CVE-2004-0230", url: "https://bugzilla.suse.com/1198501", }, { category: "external", summary: "SUSE Bug 1206598 for CVE-2004-0230", url: "https://bugzilla.suse.com/1206598", }, { category: "external", summary: "SUSE Bug 969340 for CVE-2004-0230", url: "https://bugzilla.suse.com/969340", }, { category: "external", summary: "SUSE Bug 989152 for CVE-2004-0230", url: "https://bugzilla.suse.com/989152", }, { category: "external", summary: "SUSE Bug 992991 for CVE-2004-0230", url: "https://bugzilla.suse.com/992991", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2004-0230", }, { cve: "CVE-2012-6704", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6704", }, ], notes: [ { category: "general", text: "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-6704", url: "https://www.suse.com/security/cve/CVE-2012-6704", }, { category: "external", summary: "SUSE Bug 1013531 for CVE-2012-6704", url: "https://bugzilla.suse.com/1013531", }, { category: "external", summary: "SUSE Bug 1013542 for CVE-2012-6704", url: "https://bugzilla.suse.com/1013542", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2012-6704", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2012-6704", }, { cve: "CVE-2015-1350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1350", }, ], notes: [ { category: "general", text: "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1350", url: "https://www.suse.com/security/cve/CVE-2015-1350", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2015-1350", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 914939 for CVE-2015-1350", url: "https://bugzilla.suse.com/914939", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2015-1350", }, { cve: "CVE-2015-8956", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8956", }, ], notes: [ { category: "general", text: "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8956", url: "https://www.suse.com/security/cve/CVE-2015-8956", }, { category: "external", summary: "SUSE Bug 1003925 for CVE-2015-8956", url: "https://bugzilla.suse.com/1003925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2015-8956", }, { cve: "CVE-2015-8962", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8962", }, ], notes: [ { category: "general", text: "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8962", url: "https://www.suse.com/security/cve/CVE-2015-8962", }, { category: "external", summary: "SUSE Bug 1010501 for CVE-2015-8962", url: "https://bugzilla.suse.com/1010501", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2015-8962", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2015-8962", }, { cve: "CVE-2015-8964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8964", }, ], notes: [ { category: "general", text: "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8964", url: "https://www.suse.com/security/cve/CVE-2015-8964", }, { category: "external", summary: "SUSE Bug 1010507 for CVE-2015-8964", url: "https://bugzilla.suse.com/1010507", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2015-8964", }, { cve: "CVE-2015-8970", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8970", }, ], notes: [ { category: "general", text: "crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8970", url: "https://www.suse.com/security/cve/CVE-2015-8970", }, { category: "external", summary: "SUSE Bug 1008374 for CVE-2015-8970", url: "https://bugzilla.suse.com/1008374", }, { category: "external", summary: "SUSE Bug 1008850 for CVE-2015-8970", url: "https://bugzilla.suse.com/1008850", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2015-8970", }, { cve: "CVE-2016-0823", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0823", }, ], notes: [ { category: "general", text: "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0823", url: "https://www.suse.com/security/cve/CVE-2016-0823", }, { category: "external", summary: "SUSE Bug 987709 for CVE-2016-0823", url: "https://bugzilla.suse.com/987709", }, { category: "external", summary: "SUSE Bug 994759 for CVE-2016-0823", url: "https://bugzilla.suse.com/994759", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-0823", }, { cve: "CVE-2016-10088", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10088", }, ], notes: [ { category: "general", text: "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10088", url: "https://www.suse.com/security/cve/CVE-2016-10088", }, { category: "external", summary: "SUSE Bug 1013604 for CVE-2016-10088", url: "https://bugzilla.suse.com/1013604", }, { category: "external", summary: "SUSE Bug 1014271 for CVE-2016-10088", url: "https://bugzilla.suse.com/1014271", }, { category: "external", summary: "SUSE Bug 1017710 for CVE-2016-10088", url: "https://bugzilla.suse.com/1017710", }, { category: "external", summary: "SUSE Bug 1019079 for CVE-2016-10088", url: "https://bugzilla.suse.com/1019079", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-10088", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "important", }, ], title: "CVE-2016-10088", }, { cve: "CVE-2016-3841", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3841", }, ], notes: [ { category: "general", text: "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3841", url: "https://www.suse.com/security/cve/CVE-2016-3841", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-3841", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-3841", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 992566 for CVE-2016-3841", url: "https://bugzilla.suse.com/992566", }, { category: "external", summary: "SUSE Bug 992569 for CVE-2016-3841", url: "https://bugzilla.suse.com/992569", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-3841", }, { cve: "CVE-2016-6828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6828", }, ], notes: [ { category: "general", text: "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6828", url: "https://www.suse.com/security/cve/CVE-2016-6828", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-6828", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 994296 for CVE-2016-6828", url: "https://bugzilla.suse.com/994296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-6828", }, { cve: "CVE-2016-7042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7042", }, ], notes: [ { category: "general", text: "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7042", url: "https://www.suse.com/security/cve/CVE-2016-7042", }, { category: "external", summary: "SUSE Bug 1004517 for CVE-2016-7042", url: "https://bugzilla.suse.com/1004517", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-7042", }, { cve: "CVE-2016-7097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7097", }, ], notes: [ { category: "general", text: "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7097", url: "https://www.suse.com/security/cve/CVE-2016-7097", }, { category: "external", summary: "SUSE Bug 1021258 for CVE-2016-7097", url: "https://bugzilla.suse.com/1021258", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-7097", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-7097", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 995968 for CVE-2016-7097", url: "https://bugzilla.suse.com/995968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "low", }, ], title: "CVE-2016-7097", }, { cve: "CVE-2016-7117", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7117", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7117", url: "https://www.suse.com/security/cve/CVE-2016-7117", }, { category: "external", summary: "SUSE Bug 1003077 for CVE-2016-7117", url: "https://bugzilla.suse.com/1003077", }, { category: "external", summary: "SUSE Bug 1003253 for CVE-2016-7117", url: "https://bugzilla.suse.com/1003253", }, { category: "external", summary: "SUSE Bug 1057478 for CVE-2016-7117", url: "https://bugzilla.suse.com/1057478", }, { category: "external", summary: "SUSE Bug 1071943 for CVE-2016-7117", url: "https://bugzilla.suse.com/1071943", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-7117", }, { cve: "CVE-2016-7425", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7425", }, ], notes: [ { category: "general", text: "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7425", url: "https://www.suse.com/security/cve/CVE-2016-7425", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7425", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 999932 for CVE-2016-7425", url: "https://bugzilla.suse.com/999932", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-7425", }, { cve: "CVE-2016-7910", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7910", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7910", url: "https://www.suse.com/security/cve/CVE-2016-7910", }, { category: "external", summary: "SUSE Bug 1010716 for CVE-2016-7910", url: "https://bugzilla.suse.com/1010716", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7910", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 1196722 for CVE-2016-7910", url: "https://bugzilla.suse.com/1196722", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-7910", }, { cve: "CVE-2016-7911", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7911", }, ], notes: [ { category: "general", text: "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7911", url: "https://www.suse.com/security/cve/CVE-2016-7911", }, { category: "external", summary: "SUSE Bug 1010711 for CVE-2016-7911", url: "https://bugzilla.suse.com/1010711", }, { category: "external", summary: "SUSE Bug 1010713 for CVE-2016-7911", url: "https://bugzilla.suse.com/1010713", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7911", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-7911", }, { cve: "CVE-2016-7916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7916", }, ], notes: [ { category: "general", text: "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7916", url: "https://www.suse.com/security/cve/CVE-2016-7916", }, { category: "external", summary: "SUSE Bug 1010467 for CVE-2016-7916", url: "https://bugzilla.suse.com/1010467", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-7916", }, { cve: "CVE-2016-8399", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8399", }, ], notes: [ { category: "general", text: "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8399", url: "https://www.suse.com/security/cve/CVE-2016-8399", }, { category: "external", summary: "SUSE Bug 1014746 for CVE-2016-8399", url: "https://bugzilla.suse.com/1014746", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-8399", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-8399", }, { cve: "CVE-2016-8632", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8632", }, ], notes: [ { category: "general", text: "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8632", url: "https://www.suse.com/security/cve/CVE-2016-8632", }, { category: "external", summary: "SUSE Bug 1008831 for CVE-2016-8632", url: "https://bugzilla.suse.com/1008831", }, { category: "external", summary: "SUSE Bug 1012852 for CVE-2016-8632", url: "https://bugzilla.suse.com/1012852", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-8632", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-8632", }, { cve: "CVE-2016-8633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8633", }, ], notes: [ { category: "general", text: "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8633", url: "https://www.suse.com/security/cve/CVE-2016-8633", }, { category: "external", summary: "SUSE Bug 1008833 for CVE-2016-8633", url: "https://bugzilla.suse.com/1008833", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-8633", }, { cve: "CVE-2016-8646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8646", }, ], notes: [ { category: "general", text: "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8646", url: "https://www.suse.com/security/cve/CVE-2016-8646", }, { category: "external", summary: "SUSE Bug 1010150 for CVE-2016-8646", url: "https://bugzilla.suse.com/1010150", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-8646", }, { cve: "CVE-2016-9555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9555", }, ], notes: [ { category: "general", text: "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9555", url: "https://www.suse.com/security/cve/CVE-2016-9555", }, { category: "external", summary: "SUSE Bug 1011685 for CVE-2016-9555", url: "https://bugzilla.suse.com/1011685", }, { category: "external", summary: "SUSE Bug 1012183 for CVE-2016-9555", url: "https://bugzilla.suse.com/1012183", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-9555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "important", }, ], title: "CVE-2016-9555", }, { cve: "CVE-2016-9685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9685", }, ], notes: [ { category: "general", text: "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9685", url: "https://www.suse.com/security/cve/CVE-2016-9685", }, { category: "external", summary: "SUSE Bug 1012832 for CVE-2016-9685", url: "https://bugzilla.suse.com/1012832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "low", }, ], title: "CVE-2016-9685", }, { cve: "CVE-2016-9756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9756", }, ], notes: [ { category: "general", text: "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9756", url: "https://www.suse.com/security/cve/CVE-2016-9756", }, { category: "external", summary: "SUSE Bug 1013038 for CVE-2016-9756", url: "https://bugzilla.suse.com/1013038", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-9756", }, { cve: "CVE-2016-9793", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9793", }, ], notes: [ { category: "general", text: "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9793", url: "https://www.suse.com/security/cve/CVE-2016-9793", }, { category: "external", summary: "SUSE Bug 1013531 for CVE-2016-9793", url: "https://bugzilla.suse.com/1013531", }, { category: "external", summary: "SUSE Bug 1013542 for CVE-2016-9793", url: "https://bugzilla.suse.com/1013542", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-9793", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "moderate", }, ], title: "CVE-2016-9793", }, { cve: "CVE-2017-5551", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5551", }, ], notes: [ { category: "general", text: "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5551", url: "https://www.suse.com/security/cve/CVE-2017-5551", }, { category: "external", summary: "SUSE Bug 1021258 for CVE-2017-5551", url: "https://bugzilla.suse.com/1021258", }, { category: "external", summary: "SUSE Bug 995968 for CVE-2017-5551", url: "https://bugzilla.suse.com/995968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.96.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.96.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-17T13:56:58Z", details: "low", }, ], title: "CVE-2017-5551", }, ], }
suse-su-2017:0333-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThis is the last planned LTSS kernel update for the SUSE Linux Enterprise Server 11 SP2 LTSS.\n\nThe following security bugs were fixed:\n\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-8399: An out of bounds read in the ping protocol handler could have lead to information disclosure (bsc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2017-5551: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. This CVE tracks the fix for the tmpfs filesystem. (bsc#1021258).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \\0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).\n- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n\n\nThe following non-security bugs were fixed:\n\n- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cgroups: do not attach task to subsystem if migration failed (bnc#979274).\n- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).\n- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).\n- dasd: Fix unresumed device after suspend/resume (bnc#927287, LTC#123892).\n- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kvm: x86: SYSENTER emulation is broken (bsc#994618).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).\n- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261, bsc#1011482).\n- nfs: do not do blind d_drop() in nfs_prime_dcache() (bnc#908069 bnc#896484 bsc#963053).\n- nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484 bsc#963053).\n- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- nfsv4: Ensure that we do not drop a state owner more than once (bsc#979595).\n- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595, bsc#1011482).\n- nfsv4: nfs4_proc_renew should be declared static (bnc#863873).\n- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).\n- nfsv4: Recovery of recalled read delegations is broken (bsc#956514 bsc#1011482).\n- nfsv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873).\n- powerpc: Add ability to build little endian kernels (bsc#967716).\n- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).\n- powerpc: Do not build assembly files with ABIv2 (bsc#967716).\n- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).\n- powerpc: dtc is required to build dtb files (bsc#967716).\n- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).\n- powerpc: Fix error when cross building TAGS & cscope (bsc#967716).\n- powerpc: Make the vdso32 also build big-endian (bsc#967716).\n- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).\n- powerpc: Remove buggy 9-year-old test for binutils < 2.12.1 (bsc#967716).\n- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).\n- qeth: Fix crash on initial MTU size change (bnc#835175, LTC#96809).\n- qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873).\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- Revert 's390/mm: fix asce_bits handling with dynamic pagetable levels' This reverts commit 6e00b1d803fa2ab4b130e04b7fbcc99f0b5ecba8.\n- rpm/config.sh: Set the release string to 0.7.<RELEASE> (bsc#997059)\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).\n- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).\n- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).\n- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456). Conflicts: \tseries.conf\n- s390/pageattr: do a single TLB flush for change_page_attr (bsc#1009443,LTC#148182).\n- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n", title: "Description of the patch", }, { category: "details", text: "slessp2-kernel-12961", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0333-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:0333-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20170333-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:0333-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html", }, { category: "self", summary: "SUSE Bug 1003077", url: "https://bugzilla.suse.com/1003077", }, { category: "self", summary: "SUSE Bug 1003925", url: "https://bugzilla.suse.com/1003925", }, { category: "self", summary: "SUSE Bug 1004517", url: "https://bugzilla.suse.com/1004517", }, { category: "self", summary: "SUSE Bug 1007944", url: "https://bugzilla.suse.com/1007944", }, { category: "self", summary: "SUSE Bug 1008645", url: "https://bugzilla.suse.com/1008645", }, { category: "self", summary: "SUSE Bug 1008831", url: "https://bugzilla.suse.com/1008831", }, { category: "self", summary: "SUSE Bug 1008833", url: "https://bugzilla.suse.com/1008833", }, { category: "self", summary: "SUSE Bug 1009443", url: "https://bugzilla.suse.com/1009443", }, { category: "self", summary: "SUSE Bug 1010150", url: "https://bugzilla.suse.com/1010150", }, { category: "self", summary: "SUSE Bug 1010467", url: "https://bugzilla.suse.com/1010467", }, { category: "self", summary: "SUSE Bug 1010501", url: "https://bugzilla.suse.com/1010501", }, { category: "self", summary: "SUSE Bug 1010507", url: "https://bugzilla.suse.com/1010507", }, { category: "self", summary: "SUSE Bug 1010711", url: "https://bugzilla.suse.com/1010711", }, { category: "self", summary: "SUSE Bug 1010716", url: "https://bugzilla.suse.com/1010716", }, { category: "self", summary: "SUSE Bug 1011482", url: "https://bugzilla.suse.com/1011482", }, { category: "self", summary: "SUSE Bug 1011685", url: "https://bugzilla.suse.com/1011685", }, { category: "self", summary: "SUSE Bug 1012422", url: "https://bugzilla.suse.com/1012422", }, { category: "self", summary: "SUSE Bug 1012832", url: "https://bugzilla.suse.com/1012832", }, { category: "self", summary: "SUSE Bug 1013038", url: "https://bugzilla.suse.com/1013038", }, { category: "self", summary: "SUSE Bug 1013531", url: "https://bugzilla.suse.com/1013531", }, { category: "self", summary: "SUSE Bug 1013542", url: "https://bugzilla.suse.com/1013542", }, { category: "self", summary: "SUSE Bug 1014746", url: "https://bugzilla.suse.com/1014746", }, { category: "self", summary: "SUSE Bug 1017710", url: "https://bugzilla.suse.com/1017710", }, { category: "self", summary: "SUSE Bug 1021258", url: "https://bugzilla.suse.com/1021258", }, { category: "self", summary: "SUSE Bug 835175", url: "https://bugzilla.suse.com/835175", }, { category: "self", summary: "SUSE Bug 839104", url: "https://bugzilla.suse.com/839104", }, { category: "self", summary: "SUSE Bug 863873", url: "https://bugzilla.suse.com/863873", }, { category: "self", summary: "SUSE Bug 874145", url: "https://bugzilla.suse.com/874145", }, { category: "self", summary: "SUSE Bug 896484", url: "https://bugzilla.suse.com/896484", }, { category: "self", summary: "SUSE Bug 908069", url: "https://bugzilla.suse.com/908069", }, { category: "self", summary: "SUSE Bug 914939", url: "https://bugzilla.suse.com/914939", }, { category: "self", summary: "SUSE Bug 922947", url: "https://bugzilla.suse.com/922947", }, { category: "self", summary: "SUSE Bug 927287", url: "https://bugzilla.suse.com/927287", }, { category: "self", summary: "SUSE Bug 940966", url: "https://bugzilla.suse.com/940966", }, { category: "self", summary: "SUSE Bug 950998", url: "https://bugzilla.suse.com/950998", }, { category: "self", summary: "SUSE Bug 954984", url: "https://bugzilla.suse.com/954984", }, { category: "self", summary: "SUSE Bug 956514", url: "https://bugzilla.suse.com/956514", }, { category: "self", summary: "SUSE Bug 958000", url: "https://bugzilla.suse.com/958000", }, { category: "self", summary: "SUSE Bug 960689", url: "https://bugzilla.suse.com/960689", }, { category: "self", summary: "SUSE Bug 963053", url: "https://bugzilla.suse.com/963053", }, { category: "self", summary: "SUSE Bug 967716", url: "https://bugzilla.suse.com/967716", }, { category: "self", summary: "SUSE Bug 968500", url: "https://bugzilla.suse.com/968500", }, { category: "self", summary: "SUSE Bug 969340", url: "https://bugzilla.suse.com/969340", }, { category: "self", summary: "SUSE Bug 971360", url: "https://bugzilla.suse.com/971360", }, { category: "self", summary: "SUSE Bug 971944", url: "https://bugzilla.suse.com/971944", }, { category: "self", summary: "SUSE Bug 978401", url: "https://bugzilla.suse.com/978401", }, { category: "self", summary: "SUSE Bug 978821", url: "https://bugzilla.suse.com/978821", }, { category: "self", summary: "SUSE Bug 979213", url: "https://bugzilla.suse.com/979213", }, { category: "self", summary: "SUSE Bug 979274", url: "https://bugzilla.suse.com/979274", }, { category: "self", summary: "SUSE Bug 979548", url: "https://bugzilla.suse.com/979548", }, { category: "self", summary: "SUSE Bug 979595", url: "https://bugzilla.suse.com/979595", }, { category: "self", summary: "SUSE Bug 979879", url: "https://bugzilla.suse.com/979879", }, { category: "self", summary: "SUSE Bug 979915", url: "https://bugzilla.suse.com/979915", }, { category: "self", summary: "SUSE Bug 980363", url: "https://bugzilla.suse.com/980363", }, { category: "self", summary: "SUSE Bug 980371", url: "https://bugzilla.suse.com/980371", }, { category: "self", summary: "SUSE Bug 980725", url: "https://bugzilla.suse.com/980725", }, { category: "self", summary: "SUSE Bug 981267", url: "https://bugzilla.suse.com/981267", }, { category: "self", summary: "SUSE Bug 983143", url: "https://bugzilla.suse.com/983143", }, { category: "self", summary: "SUSE Bug 983213", url: "https://bugzilla.suse.com/983213", }, { category: "self", summary: "SUSE Bug 984755", url: "https://bugzilla.suse.com/984755", }, { category: "self", summary: "SUSE Bug 986362", url: "https://bugzilla.suse.com/986362", }, { category: "self", summary: "SUSE Bug 986365", url: "https://bugzilla.suse.com/986365", }, { category: "self", summary: "SUSE Bug 986445", url: "https://bugzilla.suse.com/986445", }, { category: "self", summary: "SUSE Bug 986572", url: "https://bugzilla.suse.com/986572", }, { category: "self", summary: "SUSE Bug 989261", url: "https://bugzilla.suse.com/989261", }, { category: "self", summary: "SUSE Bug 991608", url: "https://bugzilla.suse.com/991608", }, { category: "self", summary: "SUSE Bug 991665", url: "https://bugzilla.suse.com/991665", }, { category: "self", summary: "SUSE Bug 992566", url: "https://bugzilla.suse.com/992566", }, { category: "self", summary: "SUSE Bug 993890", url: "https://bugzilla.suse.com/993890", }, { category: "self", summary: "SUSE Bug 993891", url: "https://bugzilla.suse.com/993891", }, { category: "self", summary: "SUSE Bug 994296", url: "https://bugzilla.suse.com/994296", }, { category: "self", summary: "SUSE Bug 994436", url: "https://bugzilla.suse.com/994436", }, { category: "self", summary: "SUSE Bug 994618", url: "https://bugzilla.suse.com/994618", }, { category: "self", summary: "SUSE Bug 994759", url: "https://bugzilla.suse.com/994759", }, { category: "self", summary: "SUSE Bug 995968", url: "https://bugzilla.suse.com/995968", }, { category: "self", summary: "SUSE Bug 997059", url: "https://bugzilla.suse.com/997059", }, { category: "self", summary: "SUSE Bug 999932", url: "https://bugzilla.suse.com/999932", }, { category: "self", summary: "SUSE CVE CVE-2004-0230 page", url: "https://www.suse.com/security/cve/CVE-2004-0230/", }, { category: "self", summary: "SUSE CVE CVE-2012-6704 page", url: "https://www.suse.com/security/cve/CVE-2012-6704/", }, { category: "self", summary: "SUSE CVE CVE-2013-4312 page", url: "https://www.suse.com/security/cve/CVE-2013-4312/", }, { category: "self", summary: "SUSE CVE CVE-2015-1350 page", url: "https://www.suse.com/security/cve/CVE-2015-1350/", }, { category: "self", summary: "SUSE CVE CVE-2015-7513 page", url: "https://www.suse.com/security/cve/CVE-2015-7513/", }, { category: "self", summary: "SUSE CVE CVE-2015-7833 page", url: "https://www.suse.com/security/cve/CVE-2015-7833/", }, { category: "self", summary: "SUSE CVE CVE-2015-8956 page", url: "https://www.suse.com/security/cve/CVE-2015-8956/", }, { category: "self", summary: "SUSE CVE CVE-2015-8962 page", url: "https://www.suse.com/security/cve/CVE-2015-8962/", }, { category: "self", summary: "SUSE CVE CVE-2015-8964 page", url: "https://www.suse.com/security/cve/CVE-2015-8964/", }, { category: "self", summary: "SUSE CVE CVE-2016-0823 page", url: "https://www.suse.com/security/cve/CVE-2016-0823/", }, { category: "self", summary: "SUSE CVE CVE-2016-10088 page", url: "https://www.suse.com/security/cve/CVE-2016-10088/", }, { category: "self", summary: "SUSE CVE CVE-2016-1583 page", url: "https://www.suse.com/security/cve/CVE-2016-1583/", }, { category: "self", summary: "SUSE CVE CVE-2016-2187 page", url: "https://www.suse.com/security/cve/CVE-2016-2187/", }, { category: "self", summary: "SUSE CVE CVE-2016-2189 page", url: "https://www.suse.com/security/cve/CVE-2016-2189/", }, { category: "self", summary: "SUSE CVE CVE-2016-3841 page", url: "https://www.suse.com/security/cve/CVE-2016-3841/", }, { category: "self", summary: "SUSE CVE CVE-2016-4470 page", url: "https://www.suse.com/security/cve/CVE-2016-4470/", }, { category: "self", summary: "SUSE CVE CVE-2016-4482 page", url: "https://www.suse.com/security/cve/CVE-2016-4482/", }, { category: "self", summary: "SUSE CVE CVE-2016-4485 page", url: "https://www.suse.com/security/cve/CVE-2016-4485/", }, { category: "self", summary: "SUSE CVE CVE-2016-4565 page", url: "https://www.suse.com/security/cve/CVE-2016-4565/", }, { category: "self", summary: "SUSE CVE CVE-2016-4569 page", url: "https://www.suse.com/security/cve/CVE-2016-4569/", }, { category: "self", summary: "SUSE CVE CVE-2016-4578 page", url: "https://www.suse.com/security/cve/CVE-2016-4578/", }, { category: "self", summary: "SUSE CVE CVE-2016-4580 page", url: "https://www.suse.com/security/cve/CVE-2016-4580/", }, { category: "self", summary: "SUSE CVE CVE-2016-4805 page", url: "https://www.suse.com/security/cve/CVE-2016-4805/", }, { category: "self", summary: "SUSE CVE CVE-2016-4913 page", url: "https://www.suse.com/security/cve/CVE-2016-4913/", }, { category: "self", summary: "SUSE CVE CVE-2016-4997 page", url: "https://www.suse.com/security/cve/CVE-2016-4997/", }, { category: "self", summary: "SUSE CVE CVE-2016-5244 page", url: "https://www.suse.com/security/cve/CVE-2016-5244/", }, { category: "self", summary: "SUSE CVE CVE-2016-5829 page", url: "https://www.suse.com/security/cve/CVE-2016-5829/", }, { category: "self", summary: "SUSE CVE CVE-2016-6480 page", url: "https://www.suse.com/security/cve/CVE-2016-6480/", }, { category: "self", summary: "SUSE CVE CVE-2016-6828 page", url: "https://www.suse.com/security/cve/CVE-2016-6828/", }, { category: "self", summary: "SUSE CVE CVE-2016-7042 page", url: "https://www.suse.com/security/cve/CVE-2016-7042/", }, { category: "self", summary: "SUSE CVE CVE-2016-7097 page", url: "https://www.suse.com/security/cve/CVE-2016-7097/", }, { category: "self", summary: "SUSE CVE CVE-2016-7117 page", url: "https://www.suse.com/security/cve/CVE-2016-7117/", }, { category: "self", summary: "SUSE CVE CVE-2016-7425 page", url: "https://www.suse.com/security/cve/CVE-2016-7425/", }, { category: "self", summary: "SUSE CVE CVE-2016-7910 page", url: "https://www.suse.com/security/cve/CVE-2016-7910/", }, { category: "self", summary: "SUSE CVE CVE-2016-7911 page", url: "https://www.suse.com/security/cve/CVE-2016-7911/", }, { category: "self", summary: "SUSE CVE CVE-2016-7916 page", url: "https://www.suse.com/security/cve/CVE-2016-7916/", }, { category: "self", summary: "SUSE CVE CVE-2016-8399 page", url: "https://www.suse.com/security/cve/CVE-2016-8399/", }, { category: "self", summary: "SUSE CVE CVE-2016-8632 page", url: "https://www.suse.com/security/cve/CVE-2016-8632/", }, { category: "self", summary: "SUSE CVE CVE-2016-8633 page", url: "https://www.suse.com/security/cve/CVE-2016-8633/", }, { category: "self", summary: "SUSE CVE CVE-2016-8646 page", url: "https://www.suse.com/security/cve/CVE-2016-8646/", }, { category: "self", summary: "SUSE CVE CVE-2016-9555 page", url: "https://www.suse.com/security/cve/CVE-2016-9555/", }, { category: "self", summary: "SUSE CVE CVE-2016-9685 page", url: "https://www.suse.com/security/cve/CVE-2016-9685/", }, { category: "self", summary: "SUSE CVE CVE-2016-9756 page", url: "https://www.suse.com/security/cve/CVE-2016-9756/", }, { category: "self", summary: "SUSE CVE CVE-2016-9793 page", url: "https://www.suse.com/security/cve/CVE-2016-9793/", }, { category: "self", summary: "SUSE CVE CVE-2017-5551 page", url: "https://www.suse.com/security/cve/CVE-2017-5551/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2017-01-30T16:03:00Z", generator: { date: "2017-01-30T16:03:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:0333-1", initial_release_date: "2017-01-30T16:03:00Z", revision_history: [ { date: "2017-01-30T16:03:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-default-3.0.101-0.7.53.1.i586", product: { name: "kernel-default-3.0.101-0.7.53.1.i586", product_id: "kernel-default-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-0.7.53.1.i586", product: { name: "kernel-default-base-3.0.101-0.7.53.1.i586", product_id: "kernel-default-base-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-0.7.53.1.i586", product: { name: "kernel-default-devel-3.0.101-0.7.53.1.i586", product_id: "kernel-default-devel-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-0.7.53.1.i586", product: { name: "kernel-ec2-3.0.101-0.7.53.1.i586", product_id: "kernel-ec2-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-0.7.53.1.i586", product: { name: "kernel-ec2-base-3.0.101-0.7.53.1.i586", product_id: "kernel-ec2-base-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-0.7.53.1.i586", product: { name: "kernel-ec2-devel-3.0.101-0.7.53.1.i586", product_id: "kernel-ec2-devel-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-pae-3.0.101-0.7.53.1.i586", product: { name: "kernel-pae-3.0.101-0.7.53.1.i586", product_id: "kernel-pae-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-pae-base-3.0.101-0.7.53.1.i586", product: { name: "kernel-pae-base-3.0.101-0.7.53.1.i586", product_id: "kernel-pae-base-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-pae-devel-3.0.101-0.7.53.1.i586", product: { name: "kernel-pae-devel-3.0.101-0.7.53.1.i586", product_id: "kernel-pae-devel-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-source-3.0.101-0.7.53.1.i586", product: { name: "kernel-source-3.0.101-0.7.53.1.i586", product_id: "kernel-source-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-syms-3.0.101-0.7.53.1.i586", product: { name: "kernel-syms-3.0.101-0.7.53.1.i586", product_id: "kernel-syms-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-trace-3.0.101-0.7.53.1.i586", product: { name: "kernel-trace-3.0.101-0.7.53.1.i586", product_id: "kernel-trace-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-0.7.53.1.i586", product: { name: "kernel-trace-base-3.0.101-0.7.53.1.i586", product_id: "kernel-trace-base-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-0.7.53.1.i586", product: { name: "kernel-trace-devel-3.0.101-0.7.53.1.i586", product_id: "kernel-trace-devel-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-xen-3.0.101-0.7.53.1.i586", product: { name: "kernel-xen-3.0.101-0.7.53.1.i586", product_id: "kernel-xen-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-0.7.53.1.i586", product: { name: "kernel-xen-base-3.0.101-0.7.53.1.i586", product_id: "kernel-xen-base-3.0.101-0.7.53.1.i586", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-0.7.53.1.i586", product: { name: "kernel-xen-devel-3.0.101-0.7.53.1.i586", product_id: "kernel-xen-devel-3.0.101-0.7.53.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-0.7.53.1.s390x", product: { name: "kernel-default-3.0.101-0.7.53.1.s390x", product_id: "kernel-default-3.0.101-0.7.53.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-0.7.53.1.s390x", product: { name: "kernel-default-base-3.0.101-0.7.53.1.s390x", product_id: "kernel-default-base-3.0.101-0.7.53.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-0.7.53.1.s390x", product: { name: "kernel-default-devel-3.0.101-0.7.53.1.s390x", product_id: "kernel-default-devel-3.0.101-0.7.53.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.0.101-0.7.53.1.s390x", product: { name: "kernel-default-man-3.0.101-0.7.53.1.s390x", product_id: "kernel-default-man-3.0.101-0.7.53.1.s390x", }, }, { category: "product_version", name: "kernel-source-3.0.101-0.7.53.1.s390x", product: { name: "kernel-source-3.0.101-0.7.53.1.s390x", product_id: "kernel-source-3.0.101-0.7.53.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.0.101-0.7.53.1.s390x", product: { name: "kernel-syms-3.0.101-0.7.53.1.s390x", product_id: "kernel-syms-3.0.101-0.7.53.1.s390x", }, }, { category: "product_version", name: "kernel-trace-3.0.101-0.7.53.1.s390x", product: { name: "kernel-trace-3.0.101-0.7.53.1.s390x", product_id: "kernel-trace-3.0.101-0.7.53.1.s390x", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-0.7.53.1.s390x", product: { name: "kernel-trace-base-3.0.101-0.7.53.1.s390x", product_id: "kernel-trace-base-3.0.101-0.7.53.1.s390x", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-0.7.53.1.s390x", product: { name: "kernel-trace-devel-3.0.101-0.7.53.1.s390x", product_id: "kernel-trace-devel-3.0.101-0.7.53.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-default-3.0.101-0.7.53.1.x86_64", product_id: "kernel-default-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-default-base-3.0.101-0.7.53.1.x86_64", product_id: "kernel-default-base-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-default-devel-3.0.101-0.7.53.1.x86_64", product_id: "kernel-default-devel-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-ec2-3.0.101-0.7.53.1.x86_64", product_id: "kernel-ec2-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", product_id: "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", product_id: "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-source-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-source-3.0.101-0.7.53.1.x86_64", product_id: "kernel-source-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-syms-3.0.101-0.7.53.1.x86_64", product_id: "kernel-syms-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-trace-3.0.101-0.7.53.1.x86_64", product_id: "kernel-trace-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-trace-base-3.0.101-0.7.53.1.x86_64", product_id: "kernel-trace-base-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", product_id: "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-xen-3.0.101-0.7.53.1.x86_64", product_id: "kernel-xen-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-xen-base-3.0.101-0.7.53.1.x86_64", product_id: "kernel-xen-base-3.0.101-0.7.53.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", product: { name: "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", product_id: "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles_ltss:11:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-default-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", }, product_reference: "kernel-default-3.0.101-0.7.53.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-default-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-default-base-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", }, product_reference: "kernel-default-base-3.0.101-0.7.53.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-default-devel-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", }, product_reference: "kernel-default-devel-3.0.101-0.7.53.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", }, product_reference: "kernel-default-man-3.0.101-0.7.53.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-ec2-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-ec2-base-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-ec2-devel-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-pae-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-pae-base-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-pae-devel-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-source-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", }, product_reference: "kernel-source-3.0.101-0.7.53.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-source-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-syms-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", }, product_reference: "kernel-syms-3.0.101-0.7.53.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-syms-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-trace-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", }, product_reference: "kernel-trace-3.0.101-0.7.53.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-trace-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-trace-base-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", }, product_reference: "kernel-trace-base-3.0.101-0.7.53.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-trace-devel-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", }, product_reference: "kernel-trace-devel-3.0.101-0.7.53.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-xen-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-xen-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-xen-base-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", }, product_reference: "kernel-xen-devel-3.0.101-0.7.53.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2004-0230", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2004-0230", }, ], notes: [ { category: "general", text: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2004-0230", url: "https://www.suse.com/security/cve/CVE-2004-0230", }, { category: "external", summary: "SUSE Bug 1184394 for CVE-2004-0230", url: "https://bugzilla.suse.com/1184394", }, { category: "external", summary: "SUSE Bug 1198501 for CVE-2004-0230", url: "https://bugzilla.suse.com/1198501", }, { category: "external", summary: "SUSE Bug 1206598 for CVE-2004-0230", url: "https://bugzilla.suse.com/1206598", }, { category: "external", summary: "SUSE Bug 969340 for CVE-2004-0230", url: "https://bugzilla.suse.com/969340", }, { category: "external", summary: "SUSE Bug 989152 for CVE-2004-0230", url: "https://bugzilla.suse.com/989152", }, { category: "external", summary: "SUSE Bug 992991 for CVE-2004-0230", url: "https://bugzilla.suse.com/992991", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2004-0230", }, { cve: "CVE-2012-6704", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6704", }, ], notes: [ { category: "general", text: "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-6704", url: "https://www.suse.com/security/cve/CVE-2012-6704", }, { category: "external", summary: "SUSE Bug 1013531 for CVE-2012-6704", url: "https://bugzilla.suse.com/1013531", }, { category: "external", summary: "SUSE Bug 1013542 for CVE-2012-6704", url: "https://bugzilla.suse.com/1013542", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2012-6704", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2012-6704", }, { cve: "CVE-2013-4312", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-4312", }, ], notes: [ { category: "general", text: "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-4312", url: "https://www.suse.com/security/cve/CVE-2013-4312", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2013-4312", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 839104 for CVE-2013-4312", url: "https://bugzilla.suse.com/839104", }, { category: "external", summary: "SUSE Bug 922947 for CVE-2013-4312", url: "https://bugzilla.suse.com/922947", }, { category: "external", summary: "SUSE Bug 968014 for CVE-2013-4312", url: "https://bugzilla.suse.com/968014", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2013-4312", }, { cve: "CVE-2015-1350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1350", }, ], notes: [ { category: "general", text: "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1350", url: "https://www.suse.com/security/cve/CVE-2015-1350", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2015-1350", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 914939 for CVE-2015-1350", url: "https://bugzilla.suse.com/914939", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2015-1350", }, { cve: "CVE-2015-7513", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-7513", }, ], notes: [ { category: "general", text: "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-7513", url: "https://www.suse.com/security/cve/CVE-2015-7513", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2015-7513", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 960689 for CVE-2015-7513", url: "https://bugzilla.suse.com/960689", }, { category: "external", summary: "SUSE Bug 987709 for CVE-2015-7513", url: "https://bugzilla.suse.com/987709", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2015-7513", }, { cve: "CVE-2015-7833", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-7833", }, ], notes: [ { category: "general", text: "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-7833", url: "https://www.suse.com/security/cve/CVE-2015-7833", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2015-7833", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 950998 for CVE-2015-7833", url: "https://bugzilla.suse.com/950998", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2015-7833", }, { cve: "CVE-2015-8956", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8956", }, ], notes: [ { category: "general", text: "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8956", url: "https://www.suse.com/security/cve/CVE-2015-8956", }, { category: "external", summary: "SUSE Bug 1003925 for CVE-2015-8956", url: "https://bugzilla.suse.com/1003925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2015-8956", }, { cve: "CVE-2015-8962", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8962", }, ], notes: [ { category: "general", text: "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8962", url: "https://www.suse.com/security/cve/CVE-2015-8962", }, { category: "external", summary: "SUSE Bug 1010501 for CVE-2015-8962", url: "https://bugzilla.suse.com/1010501", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2015-8962", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2015-8962", }, { cve: "CVE-2015-8964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8964", }, ], notes: [ { category: "general", text: "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8964", url: "https://www.suse.com/security/cve/CVE-2015-8964", }, { category: "external", summary: "SUSE Bug 1010507 for CVE-2015-8964", url: "https://bugzilla.suse.com/1010507", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2015-8964", }, { cve: "CVE-2016-0823", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0823", }, ], notes: [ { category: "general", text: "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0823", url: "https://www.suse.com/security/cve/CVE-2016-0823", }, { category: "external", summary: "SUSE Bug 987709 for CVE-2016-0823", url: "https://bugzilla.suse.com/987709", }, { category: "external", summary: "SUSE Bug 994759 for CVE-2016-0823", url: "https://bugzilla.suse.com/994759", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-0823", }, { cve: "CVE-2016-10088", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10088", }, ], notes: [ { category: "general", text: "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10088", url: "https://www.suse.com/security/cve/CVE-2016-10088", }, { category: "external", summary: "SUSE Bug 1013604 for CVE-2016-10088", url: "https://bugzilla.suse.com/1013604", }, { category: "external", summary: "SUSE Bug 1014271 for CVE-2016-10088", url: "https://bugzilla.suse.com/1014271", }, { category: "external", summary: "SUSE Bug 1017710 for CVE-2016-10088", url: "https://bugzilla.suse.com/1017710", }, { category: "external", summary: "SUSE Bug 1019079 for CVE-2016-10088", url: "https://bugzilla.suse.com/1019079", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-10088", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "important", }, ], title: "CVE-2016-10088", }, { cve: "CVE-2016-1583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1583", }, ], notes: [ { category: "general", text: "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1583", url: "https://www.suse.com/security/cve/CVE-2016-1583", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-1583", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-1583", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 983143 for CVE-2016-1583", url: "https://bugzilla.suse.com/983143", }, { category: "external", summary: "SUSE Bug 983144 for CVE-2016-1583", url: "https://bugzilla.suse.com/983144", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "important", }, ], title: "CVE-2016-1583", }, { cve: "CVE-2016-2187", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2187", }, ], notes: [ { category: "general", text: "The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2187", url: "https://www.suse.com/security/cve/CVE-2016-2187", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2187", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 971919 for CVE-2016-2187", url: "https://bugzilla.suse.com/971919", }, { category: "external", summary: "SUSE Bug 971944 for CVE-2016-2187", url: "https://bugzilla.suse.com/971944", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-2187", }, { cve: "CVE-2016-2189", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2189", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-4565. Reason: This candidate is a reservation duplicate of CVE-2016-4565. Notes: All CVE users should reference CVE-2016-4565 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2189", url: "https://www.suse.com/security/cve/CVE-2016-2189", }, { category: "external", summary: "SUSE Bug 979548 for CVE-2016-2189", url: "https://bugzilla.suse.com/979548", }, { category: "external", summary: "SUSE Bug 980363 for CVE-2016-2189", url: "https://bugzilla.suse.com/980363", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-2189", }, { cve: "CVE-2016-3841", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3841", }, ], notes: [ { category: "general", text: "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3841", url: "https://www.suse.com/security/cve/CVE-2016-3841", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-3841", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-3841", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 992566 for CVE-2016-3841", url: "https://bugzilla.suse.com/992566", }, { category: "external", summary: "SUSE Bug 992569 for CVE-2016-3841", url: "https://bugzilla.suse.com/992569", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-3841", }, { cve: "CVE-2016-4470", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4470", }, ], notes: [ { category: "general", text: "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4470", url: "https://www.suse.com/security/cve/CVE-2016-4470", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4470", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 984755 for CVE-2016-4470", url: "https://bugzilla.suse.com/984755", }, { category: "external", summary: "SUSE Bug 984764 for CVE-2016-4470", url: "https://bugzilla.suse.com/984764", }, { category: "external", summary: "SUSE Bug 991651 for CVE-2016-4470", url: "https://bugzilla.suse.com/991651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-4470", }, { cve: "CVE-2016-4482", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4482", }, ], notes: [ { category: "general", text: "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4482", url: "https://www.suse.com/security/cve/CVE-2016-4482", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4482", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 978401 for CVE-2016-4482", url: "https://bugzilla.suse.com/978401", }, { category: "external", summary: "SUSE Bug 978445 for CVE-2016-4482", url: "https://bugzilla.suse.com/978445", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "low", }, ], title: "CVE-2016-4482", }, { cve: "CVE-2016-4485", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4485", }, ], notes: [ { category: "general", text: "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4485", url: "https://www.suse.com/security/cve/CVE-2016-4485", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4485", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 978821 for CVE-2016-4485", url: "https://bugzilla.suse.com/978821", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-4485", }, { cve: "CVE-2016-4565", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4565", }, ], notes: [ { category: "general", text: "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4565", url: "https://www.suse.com/security/cve/CVE-2016-4565", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4565", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 979548 for CVE-2016-4565", url: "https://bugzilla.suse.com/979548", }, { category: "external", summary: "SUSE Bug 980363 for CVE-2016-4565", url: "https://bugzilla.suse.com/980363", }, { category: "external", summary: "SUSE Bug 980883 for CVE-2016-4565", url: "https://bugzilla.suse.com/980883", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-4565", }, { cve: "CVE-2016-4569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4569", }, ], notes: [ { category: "general", text: "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4569", url: "https://www.suse.com/security/cve/CVE-2016-4569", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4569", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 979213 for CVE-2016-4569", url: "https://bugzilla.suse.com/979213", }, { category: "external", summary: "SUSE Bug 979879 for CVE-2016-4569", url: "https://bugzilla.suse.com/979879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "low", }, ], title: "CVE-2016-4569", }, { cve: "CVE-2016-4578", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4578", }, ], notes: [ { category: "general", text: "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4578", url: "https://www.suse.com/security/cve/CVE-2016-4578", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4578", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-4578", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 979879 for CVE-2016-4578", url: "https://bugzilla.suse.com/979879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "low", }, ], title: "CVE-2016-4578", }, { cve: "CVE-2016-4580", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4580", }, ], notes: [ { category: "general", text: "The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4580", url: "https://www.suse.com/security/cve/CVE-2016-4580", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-4580", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 981267 for CVE-2016-4580", url: "https://bugzilla.suse.com/981267", }, { category: "external", summary: "SUSE Bug 985132 for CVE-2016-4580", url: "https://bugzilla.suse.com/985132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "low", }, ], title: "CVE-2016-4580", }, { cve: "CVE-2016-4805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4805", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4805", url: "https://www.suse.com/security/cve/CVE-2016-4805", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4805", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-4805", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 980371 for CVE-2016-4805", url: "https://bugzilla.suse.com/980371", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "low", }, ], title: "CVE-2016-4805", }, { cve: "CVE-2016-4913", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4913", }, ], notes: [ { category: "general", text: "The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4913", url: "https://www.suse.com/security/cve/CVE-2016-4913", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-4913", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-4913", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 980725 for CVE-2016-4913", url: "https://bugzilla.suse.com/980725", }, { category: "external", summary: "SUSE Bug 985132 for CVE-2016-4913", url: "https://bugzilla.suse.com/985132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-4913", }, { cve: "CVE-2016-4997", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4997", }, ], notes: [ { category: "general", text: "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4997", url: "https://www.suse.com/security/cve/CVE-2016-4997", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4997", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 986362 for CVE-2016-4997", url: "https://bugzilla.suse.com/986362", }, { category: "external", summary: "SUSE Bug 986365 for CVE-2016-4997", url: "https://bugzilla.suse.com/986365", }, { category: "external", summary: "SUSE Bug 986377 for CVE-2016-4997", url: "https://bugzilla.suse.com/986377", }, { category: "external", summary: "SUSE Bug 991651 for CVE-2016-4997", url: "https://bugzilla.suse.com/991651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "important", }, ], title: "CVE-2016-4997", }, { cve: "CVE-2016-5244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5244", }, ], notes: [ { category: "general", text: "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5244", url: "https://www.suse.com/security/cve/CVE-2016-5244", }, { category: "external", summary: "SUSE Bug 983213 for CVE-2016-5244", url: "https://bugzilla.suse.com/983213", }, { category: "external", summary: "SUSE Bug 986225 for CVE-2016-5244", url: "https://bugzilla.suse.com/986225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-5244", }, { cve: "CVE-2016-5829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5829", }, ], notes: [ { category: "general", text: "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5829", url: "https://www.suse.com/security/cve/CVE-2016-5829", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2016-5829", url: "https://bugzilla.suse.com/1053919", }, { category: "external", summary: "SUSE Bug 1054127 for CVE-2016-5829", url: "https://bugzilla.suse.com/1054127", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-5829", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 986572 for CVE-2016-5829", url: "https://bugzilla.suse.com/986572", }, { category: "external", summary: "SUSE Bug 986573 for CVE-2016-5829", url: "https://bugzilla.suse.com/986573", }, { category: "external", summary: "SUSE Bug 991651 for CVE-2016-5829", url: "https://bugzilla.suse.com/991651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-5829", }, { cve: "CVE-2016-6480", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6480", }, ], notes: [ { category: "general", text: "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6480", url: "https://www.suse.com/security/cve/CVE-2016-6480", }, { category: "external", summary: "SUSE Bug 1004418 for CVE-2016-6480", url: "https://bugzilla.suse.com/1004418", }, { category: "external", summary: "SUSE Bug 991608 for CVE-2016-6480", url: "https://bugzilla.suse.com/991608", }, { category: "external", summary: "SUSE Bug 991667 for CVE-2016-6480", url: "https://bugzilla.suse.com/991667", }, { category: "external", summary: "SUSE Bug 992568 for CVE-2016-6480", url: "https://bugzilla.suse.com/992568", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-6480", }, { cve: "CVE-2016-6828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6828", }, ], notes: [ { category: "general", text: "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6828", url: "https://www.suse.com/security/cve/CVE-2016-6828", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-6828", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 994296 for CVE-2016-6828", url: "https://bugzilla.suse.com/994296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-6828", }, { cve: "CVE-2016-7042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7042", }, ], notes: [ { category: "general", text: "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7042", url: "https://www.suse.com/security/cve/CVE-2016-7042", }, { category: "external", summary: "SUSE Bug 1004517 for CVE-2016-7042", url: "https://bugzilla.suse.com/1004517", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-7042", }, { cve: "CVE-2016-7097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7097", }, ], notes: [ { category: "general", text: "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7097", url: "https://www.suse.com/security/cve/CVE-2016-7097", }, { category: "external", summary: "SUSE Bug 1021258 for CVE-2016-7097", url: "https://bugzilla.suse.com/1021258", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-7097", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-7097", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 995968 for CVE-2016-7097", url: "https://bugzilla.suse.com/995968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "low", }, ], title: "CVE-2016-7097", }, { cve: "CVE-2016-7117", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7117", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7117", url: "https://www.suse.com/security/cve/CVE-2016-7117", }, { category: "external", summary: "SUSE Bug 1003077 for CVE-2016-7117", url: "https://bugzilla.suse.com/1003077", }, { category: "external", summary: "SUSE Bug 1003253 for CVE-2016-7117", url: "https://bugzilla.suse.com/1003253", }, { category: "external", summary: "SUSE Bug 1057478 for CVE-2016-7117", url: "https://bugzilla.suse.com/1057478", }, { category: "external", summary: "SUSE Bug 1071943 for CVE-2016-7117", url: "https://bugzilla.suse.com/1071943", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-7117", }, { cve: "CVE-2016-7425", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7425", }, ], notes: [ { category: "general", text: "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7425", url: "https://www.suse.com/security/cve/CVE-2016-7425", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7425", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 999932 for CVE-2016-7425", url: "https://bugzilla.suse.com/999932", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-7425", }, { cve: "CVE-2016-7910", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7910", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7910", url: "https://www.suse.com/security/cve/CVE-2016-7910", }, { category: "external", summary: "SUSE Bug 1010716 for CVE-2016-7910", url: "https://bugzilla.suse.com/1010716", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7910", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 1196722 for CVE-2016-7910", url: "https://bugzilla.suse.com/1196722", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-7910", }, { cve: "CVE-2016-7911", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7911", }, ], notes: [ { category: "general", text: "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7911", url: "https://www.suse.com/security/cve/CVE-2016-7911", }, { category: "external", summary: "SUSE Bug 1010711 for CVE-2016-7911", url: "https://bugzilla.suse.com/1010711", }, { category: "external", summary: "SUSE Bug 1010713 for CVE-2016-7911", url: "https://bugzilla.suse.com/1010713", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7911", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-7911", }, { cve: "CVE-2016-7916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7916", }, ], notes: [ { category: "general", text: "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7916", url: "https://www.suse.com/security/cve/CVE-2016-7916", }, { category: "external", summary: "SUSE Bug 1010467 for CVE-2016-7916", url: "https://bugzilla.suse.com/1010467", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-7916", }, { cve: "CVE-2016-8399", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8399", }, ], notes: [ { category: "general", text: "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8399", url: "https://www.suse.com/security/cve/CVE-2016-8399", }, { category: "external", summary: "SUSE Bug 1014746 for CVE-2016-8399", url: "https://bugzilla.suse.com/1014746", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-8399", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-8399", }, { cve: "CVE-2016-8632", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8632", }, ], notes: [ { category: "general", text: "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8632", url: "https://www.suse.com/security/cve/CVE-2016-8632", }, { category: "external", summary: "SUSE Bug 1008831 for CVE-2016-8632", url: "https://bugzilla.suse.com/1008831", }, { category: "external", summary: "SUSE Bug 1012852 for CVE-2016-8632", url: "https://bugzilla.suse.com/1012852", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-8632", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-8632", }, { cve: "CVE-2016-8633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8633", }, ], notes: [ { category: "general", text: "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8633", url: "https://www.suse.com/security/cve/CVE-2016-8633", }, { category: "external", summary: "SUSE Bug 1008833 for CVE-2016-8633", url: "https://bugzilla.suse.com/1008833", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-8633", }, { cve: "CVE-2016-8646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8646", }, ], notes: [ { category: "general", text: "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8646", url: "https://www.suse.com/security/cve/CVE-2016-8646", }, { category: "external", summary: "SUSE Bug 1010150 for CVE-2016-8646", url: "https://bugzilla.suse.com/1010150", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-8646", }, { cve: "CVE-2016-9555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9555", }, ], notes: [ { category: "general", text: "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9555", url: "https://www.suse.com/security/cve/CVE-2016-9555", }, { category: "external", summary: "SUSE Bug 1011685 for CVE-2016-9555", url: "https://bugzilla.suse.com/1011685", }, { category: "external", summary: "SUSE Bug 1012183 for CVE-2016-9555", url: "https://bugzilla.suse.com/1012183", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-9555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "important", }, ], title: "CVE-2016-9555", }, { cve: "CVE-2016-9685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9685", }, ], notes: [ { category: "general", text: "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9685", url: "https://www.suse.com/security/cve/CVE-2016-9685", }, { category: "external", summary: "SUSE Bug 1012832 for CVE-2016-9685", url: "https://bugzilla.suse.com/1012832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "low", }, ], title: "CVE-2016-9685", }, { cve: "CVE-2016-9756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9756", }, ], notes: [ { category: "general", text: "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9756", url: "https://www.suse.com/security/cve/CVE-2016-9756", }, { category: "external", summary: "SUSE Bug 1013038 for CVE-2016-9756", url: "https://bugzilla.suse.com/1013038", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-9756", }, { cve: "CVE-2016-9793", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9793", }, ], notes: [ { category: "general", text: "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9793", url: "https://www.suse.com/security/cve/CVE-2016-9793", }, { category: "external", summary: "SUSE Bug 1013531 for CVE-2016-9793", url: "https://bugzilla.suse.com/1013531", }, { category: "external", summary: "SUSE Bug 1013542 for CVE-2016-9793", url: "https://bugzilla.suse.com/1013542", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-9793", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "moderate", }, ], title: "CVE-2016-9793", }, { cve: "CVE-2017-5551", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5551", }, ], notes: [ { category: "general", text: "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5551", url: "https://www.suse.com/security/cve/CVE-2017-5551", }, { category: "external", summary: "SUSE Bug 1021258 for CVE-2017-5551", url: "https://bugzilla.suse.com/1021258", }, { category: "external", summary: "SUSE Bug 995968 for CVE-2017-5551", url: "https://bugzilla.suse.com/995968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-01-30T16:03:00Z", details: "low", }, ], title: "CVE-2017-5551", }, ], }
var-200408-0145
Vulnerability from variot
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP. A vulnerability exists in the reliance of the Border Gateway Protocol (BGP) on the Transmission Control Protocol (TCP) to maintain persistent sessions. Sustained exploitation of this vulnerability could lead to a denial-of-service condition affecting a large segment of the Internet community. Normal operations would most likely resume shortly after the attack stopped. TCP Has a sequence number TCP There is a problem that it is justified if it is within the window. Therefore, there is a vulnerability that makes it easy to guess the external sequence number when establishing a long-term connection that increases the window size. Note that products affected by this vulnerability TCP Covers many products with implementation. For more information, NISCC-236929 (JVN) , NISCC Advisory 236929 (CPNI Advisory 00391) Please check also.A third party TCP By predicting the sequence number of a particular TCP Service operation interruption such as forcibly terminating a connection (DoS) There is a possibility of being attacked. A vulnerability in TCP implementations may permit unauthorized remote users to reset TCP sessions. This issue affects products released by multiple vendors. Exploiting this issue may permit remote attackers to more easily approximate TCP sequence numbers. This will permit a remote attacker to inject a SYN or RST packet into the session, causing it to be reset and effectively allowing denial-of-service attacks. An attacker would exploit this issue by sending a packet to a receiving implementation with an approximated sequence number and a forged source IP and TCP port. Few factors may present viable target implementations, such as imlementations that: - depend on long-lived TCP connections - have known or easily guessed IP address endpoints - have known or easily guessed TCP source ports. As a result, this issue is likely to affect a number of routing platforms. Note also that while a number of vendors have confirmed this issue in various products, investigations are ongoing and it is likely that many other vendors and products will turn out to be vulnerable as the issue is investigated further. Other consequences may also result from this issue, such as injecting specific data in TCP sessions, but this has not been confirmed. **Update: Microsoft platforms are also reported prone to this vulnerability. Vendor reports indicate that an attacker will require knowledge of the IP address and port numbers of the source and destination of an existent legitimate TCP connection in order to exploit this vulnerability on Microsoft platforms. The following products and versions are affected: Oracle Solaris 10, 11; Openpgp 2.6.2; Mcafee Network Data Loss Prevention 8.6 and earlier, 9.2.0, 9.2.1, 9.2.2; Netbsd 1.5, Version 1.5.1, Version 1.5.2, Version 1.5.3, Version 1.6, Version 1.6.1, Version 1.6.2, Version 2.0; Xinuos Openserver Version 5.0.6, Version 5.0.7; Juniper Networks Junos OS; Xinuos Unixware Version 7.1.1, Version 7.1.3.
Want a new IT Security job?
Vacant positions at Secunia: http://secunia.com/secunia_vacancies/
TITLE: Avaya Intuity Audix TCP Connection Reset Vulnerability
SECUNIA ADVISORY ID: SA15263
VERIFY ADVISORY: http://secunia.com/advisories/15263/
CRITICAL: Less critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: Avaya Intuity Audix R5 http://secunia.com/product/4586/
DESCRIPTION: Avaya has acknowledged a vulnerability in Intuity Audix, which can be exploited by malicious people to reset established TCP connections on a vulnerable system.
For more information: SA11440
SOLUTION: A patch will reportedly be included in the next major release.
ORIGINAL ADVISORY: Avaya: http://support.avaya.com/elmodocs2/security/ASA-2005-097_SCASA-2005-14.pdf
OTHER REFERENCES: SA11440: http://secunia.com/advisories/11440/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Routing operations would recover quickly after such attacks ended.
I. Description
In 2001, the CERT Coordination Center released CA-2001-09, describing statistical weaknesses in various TCP/IP Initial Sequence generators. In that document (http://www.cert.org/advisories/CA-2001-09.html), it was noted by Tim Newsham:
[I]f a sequence number within the receive window is known, an
attacker can inject data into the session stream or terminate the
connection. If the ISN value is known and the number of bytes sent
already sent is known, an attacker can send a simple packet to
inject data or kill the session.
Paul Watson has performed the statistical analysis of this attack when the ISN is not known and has pointed out that such an attack could be viable when specifically taking into account the TCP Window size. He has also created a proof-of-concept tool demonstrating the practicality of the attack. The National Infrastructure Security Co-Ordination Centre (NISCC) has published an advisory summarizing Paul Watson's analysis in "NISCC Vulnerability Advisory 236929," available at http://www.uniras.gov.uk/vuls/2004/236929/index.htm.
Since TCP is an insecure protocol, it is possible to inject transport-layer packets into sessions between hosts given the right preconditions. For detailed information about BGP and some tips for securing it, please see Cisco System's documentation (http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/bgp.htm or Team Cymru (http://www.cymru.com/). This may result in a brief loss of service until the fresh routing tables are created. When this is taken into account, instead of attempting to send a spoofed packet with all potential sequence numbers, the attacker would only need to calculate an valid sequence number that falls within the next expected ISN plus or minus half the window size. According to Paul Watson's report, with a typical xDSL data connection (80 Kbps, upstream) capable of sending of 250 packets per second (pps) to a session with a TCP Window size of 65,535 bytes, it would be possible to inject a TCP packet approximately every 5 minutes. It would take approximately 15 seconds with a T-1 (1.544 Mbps) connection. These numbers are significant when large numbers of compromised machines (often called "botnets" or "zombies") can be used to generate large amounts of packets that can be directed at a particular host.
To protect against such injections, RFC 2385 provides a method of using MD5 signatures on the TCP Headers. If this form of verification is supported and enabled between two peers, then an attacker would have to obtain the key used to transmit the packet in order to successfully inject a packet into the TCP session. Another alternative would be to tunnel BGP over IPSec. Again, this would provide a form of authentication between the BGP peers and the data that they transmit. The lack of authentication when using TCP for BGP makes this type of attack more viable.
US-CERT is tracking this issue as VU#415294. This reference number corresponds to CVE candidate CAN-2004-0230. NISCC is tracking this issue as Advisory 236929.
II. Impacts could range from data corruption or session hijacking to a denial-of-service condition.
III. Solution
Apply a patch from your vendor
Please see you vendor's statement regarding the availability of patches, updates and mitigation strategies. The lack of cryptographically-strong security options for the TCP header itself is a deficiency that technologies like IPSec try to address. It must be noted that in the final analysis that if an attacker has the ability to see unencrypted TCP traffic generated from a site, that site is vulnerable to various TCP attacks - not just those mentioned here. A stronger measure that would aid in protecting against such TCP attacks is end-to-end cryptographic solutions like those outlined in various IPSec documents.
The key idea with an end-to-end cryptographic solution is that there is some secure verification that a given packet belongs in a particular stream. However, the communications layer at which this cryptography is implemented will determine its effectiveness in repelling ISN based attacks. Solutions that operate above the Transport Layer (OSI Layer 4), such as SSL/TLS and SSH1/SSH2, only prevent arbitrary packets from being inserted into a session. They are unable to prevent a connection reset (denial of service) since the connection handling will be done by a lower level protocol (i.e., TCP). On the other hand, Network Layer (OSI Layer 3) cryptographic solutions such as IPSec prevent both arbitrary packets entering a transport-layer stream and connection resets because connection management is directly integrated into the secure Network Layer security model.
The solutions presented above have the desirable attribute of not requiring any changes to the TCP protocol or implementations to be made. RFC2385 ("Protection of BGP Sessions via the TCP MD5 Signature Option") and other technologies provide options for adding cryptographic protection within the TCP header at the cost of some potential denial of service, interoperability, and performance issues.
Ingress filtering
Ingress filtering manages the flow of traffic as it enters a network under your administrative control. You can configure your BGP routers to only accept packets on a specific network connection. Servers are typically the only machines that need to accept inbound connections from the public Internet. In the network usage policy of many sites, there are few reasons for external hosts to initiate inbound connections to machines that provide no public services. Thus, ingress filtering should be performed at the border to prohibit externally initiated inbound connections to non-authorized services. In this fashion, the effectiveness of many intruder scanning techniques can be dramatically reduced.
Network Isolation
Complex networks can benefit by separating data channels and control channels, such as BGP, into different logical or physical networks. Technologies such as VLANs, VPNs, leased links, NAT may all be able to contribute to separating the tranmission of control information from the transmission of the data stream.
Egress filtering
Egress filtering manages the flow of traffic as it leaves a network under your administrative control. There is typically limited need for machines providing public services to initiate outbound connections to the Internet.
In the case of BGP, only your BGP routers should be establishing connections to your peers. Other BGP traffic generated on your network could be a sign of an attempted attack.
Appendix A. As vendors report new information to US-CERT, we will update the vulnerability note. If a particular vendor is not listed in either the NISCC advisory, or the vulnerability, we recommend that you contact them for their comments. ___________
US-CERT thanks Paul Watson, Cisco Systems and NISCC for notifying us about this problem and for helping us to construct this advisory. ___________
Feedback can be directed to the US-CERT Technical Staff. ___________
Copyright 2004 Carnegie Mellon University. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Cisco Security Advisory:\xa0TCP Vulnerabilities in Multiple IOS-Based Cisco Products
Revision 1.0
For Public Release 2004 April 20 21:00 UTC (GMT)
Summary
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been discovered by an external researcher. The successful exploitation enables an adversary to reset any established TCP connection in a much shorter time than was previously discussed publicly. Depending on the application, the connection may get automatically re-established. In other cases, a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending upon the attacked protocol, a successful attack may have additional consequences beyond terminated connection which must be considered. This attack vector is only applicable to the sessions which are terminating on a device (such as a router, switch, or computer) and not to the sessions that are only passing through the device (for example, transit traffic that is being routed by a router). In addition, this attack vector does not directly compromise data integrity or confidentiality.
This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml, and it describes this vulnerability as it applies to Cisco products that run Cisco IOS\xae software.
A companion advisory that describes this vulnerability for products that do not run Cisco IOS software is available at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml. The severity of the exposure depends upon the protocols and applications that utilize TCP.
This attack vector is only applicable to the sessions which are terminating on a device (such as a router, switch, or computer), and not to the sessions that are only passing through the device (for example, transit traffic that is being routed by a router).
Details
TCP is the transport layer protocol designed to provide connection-oriented reliable delivery of a data stream. To accomplish this, TCP uses a mixture of flags to indicate state and sequence numbers to identify the order in which the packets are to be reassembled. The acknowledgement number is not used in a packet with the reset (RST) flag set because a reset does not expect a packet in return. The full specification of the TCP protocol can be found at http://www.ietf.org/rfc/rfc0793.txt.
According to the RFC793 specification, it is possible to reset an established TCP connection by sending a packet with the RST or synchronize (SYN) flag set. However, the sequence number does not have to be an exact match; it is sufficient to fall within the advertised window. This significantly decreases the effort required by an adversary: the larger the window, the easier it is to reset the connection. The destination TCP port is usually known for all standard services (for example, 23 for Telnet, 80 for HTTP). Cisco IOS software uses predictable ephemeral ports for known services with a predictable increment (the next port which will be used for a subsequent connection). These values, while constant for a particular Cisco IOS software version and protocol, can vary from one release to another.
Here is an example of a normal termination of a TCP session:
Host(1) Host(2)
| |
| |
| ACK ack=1001, window=5000 |
|<----------------------------|
| |
Host(1) is
closing the session
| RST seq=1001 |
|---------------------------->|
| |
Host(2) is
closing the session
In addition, the following scenario is also permitted:
Host(1) Host(2)
| |
| |
| ACK ack=1001, window=5000 |
|<----------------------------|
| |
Host(1) is
closing the session
| RST seq=4321 |
|---------------------------->|
| |
Host(2) is
closing the session
Note how, in the second example, the RST packet was able to terminate the session although the sequence number was not the next expected one (which is 1001).
As a general rule, all protocols where a TCP connection stays established for longer than one minute should be considered exposed.
The exposure on this vulnerability can be described as follows:
-
Cisco IOS - All devices running Cisco IOS software are vulnerable. Sessions passing through the device are vulnerable only if the originating or receiving device is vulnerable, but they cannot be attacked on the router itself. This vulnerability does not compromise data integrity or confidentiality. It only affects availability.
This vulnerability is documented in the Cisco Bug Toolkit as Bug IDs CSCed27956 ( registered customers only) and CSCed38527 ( registered customers only) .
-
Cisco IOS Firewall (IOS FW) - The Cisco IOS FW monitors packets passing throughout the router and maintains the session state internally. This way, it is possible to "open" required ports and allow traffic to pass and then close them after the session has finished. Since Cisco IOS FW intercepts and examines all packets passing through the device, all TCP sessions passing through the Cisco IOS FW are vulnerable to this attack. This is valid even if the originating and receiving devices themselves are not vulnerable.
This vulnerability is documented in the Cisco Bug Toolkit as Bug ID CSCed93836 ( registered customers only) .
-
Network Address Translation (NAT) - This vulnerability does not have any effect on NAT. The NAT functionality simply rewrites ports and IP addresses. This feature does not interprete TCP flags and therefore is not vulnerable to this attack. However, the attacking packet will be passed through the router and the receiving device can be affected.
Impact
The impact will be different for each specific protocol. While in the majority of cases a TCP connection will be automatically re-established, in some specific protocols a second order of consequences may have a larger impact than tearing down the connection itself. Both external and internal (eBGP and iBGP) sessions are equally vulnerable. If an adversary tears down a BGP session between two routers, then all routes which were advertised between these two peers will be withdrawn. This would occur immediately for the router which has been attacked and after the next update/keepalive packet is sent by the other router. The BGP peering session itself will be re-established within a minute after the attack. Depending upon the exact routing configuration, withdrawal of the routes may have any of the following consequences:
-
No adverse effects at all if an appropriate static route(s) has(have) been defined on both sides of the affected session.
-
The traffic will be rerouted along other paths. This may cause some congestion along these paths.
-
A portion of the network will be completely isolated and unreachable.
If a BGP peering session is broken a few times within a short time interval, then BGP route dampening may be invoked. Dampening means that affected routes will be withdrawn from the Internet routing table for some period of time. By default that time is 45 minutes. During that time, all of the traffic whose route was advertised over the attacked BGP session will either be rerouted or a portion of the network will be unreachable. Route dampening is not enabled by default.
Cisco IOS Firewall Feature Set
It is possible to terminate an established TCP-based connection even if both endpoints are not vulnerable to this attack.
Software Versions and Fixes
Each row of the table describes a release train and the platforms or products for which it is intended. If a given release train is vulnerable, then the earliest possible releases that contain the fix and the anticipated date of availability for each are listed in the Rebuild, Interim, and Maintenance columns. In some cases, no rebuild of a particular release is planned; this is marked with the label "Not scheduled." A device running any release in the given train that is earlier than the release in a specific column (less than the earliest fixed release) is known to be vulnerable, and it should be upgraded at least to the indicated release or a later version (greater than the earliest fixed release label).
When selecting a release, keep in mind the following definitions:
-
Maintenance Most heavily tested and highly recommended release of any label in a given row of the table.
-
Rebuild Constructed from the previous maintenance or major release in the same train, it contains the fix for a specific vulnerability. Although it receives less testing, it contains only the minimal changes necessary to effect the repair. Cisco has made available several rebuilds of mainline trains to address this vulnerability, but strongly recommends running only the latest maintenance release on mainline trains.
-
Interim Built at regular intervals between maintenance releases and receives less testing. Interims should be selected only if there is no other suitable release that addresses the vulnerability, and interim images should be upgraded to the next available maintenance release as soon as possible. Interim releases are not available through manufacturing, and usually they are not available for customer download from CCO without prior arrangement with the Cisco Technical Assistance Center (TAC).
In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco TAC for assistance, as shown in the section following this table.
Fixed Cisco IOS Software Images for Cisco IOS Firewall
+------------+---------------------------------+ | Major | Availability of Repaired | | Release | Releases* | +------------+---------+---------+-------------+ | Affected | Rebuild | Interim | Maintenance | | 12.1-Based | | ** | | | Release | | | | +------------+---------+---------+-------------+ | 12.1 | 12.1 | | | | | (22c) | | | +------------+---------+---------+-------------+ | 12.1E | 12.1 | | | | | (19)E7 | | | | +---------+---------+-------------+ | | | | | +------------+---------+---------+-------------+ | Affected | Rebuild | Interim | Maintenance | | 12.2-Based | | ** | | | Release | | | | +------------+---------+---------+-------------+ | 12.2 | 12.2 | | | | | (21b) | | | | +---------+---------+-------------+ | | 12.2 | | | | | (23a) | | | +------------+---------+---------+-------------+ | 12.2T | 12.2 | | | | | (11)T11 | | | | +---------+---------+-------------+ | | 12.2 | | | | | (13)T12 | | | | +---------+---------+-------------+ | | 12.2 | | | | | (15)T12 | | | +------------+---------+---------+-------------+ | Affected | Rebuild | Interim | Maintenance | | 12.3-Based | | ** | | | Release | | | | +------------+---------+---------+-------------+ | 12.3 | 12.3 | | | | | (5c) | | | | +---------+---------+-------------+ | | 12.3 | | | | | (6a) | | | +------------+---------+---------+-------------+ | 12.3T | 12.3(4) | | | | | T4 | | | +------------+---------+---------+-------------+
Fixed Cisco IOS Software Releases and Migration Path
+----------+-------------------------------------+ | Major | Availability of Repaired Releases* | | Release | | +----------+-------------+---------+-------------+ | Affected | Rebuild | Interim | Maintenance | | 11.1 | | ** | | | -Based | | | | | Release | | | | +----------+-------------+---------+-------------+ | 11.1 | 11.1 Vulnerable. Migrate to 11.2 | +----------+-------------------------------------+ | 11.1AA | 11.1AA Vulnerable. Migrate to 11.2P | +----------+-------------------------------------+ | 11.1CC | 11.1CC Vulnerable. Migrate to 12.0 | +----------+-------------+---------+-------------+ | Affected | Rebuild | Interim | Maintenance | | 11.2 | | ** | | | -Based | | | | | Release | | | | +----------+-------------+---------+-------------+ | 11.2 | 11.2(26f) | | | | | Available | | | | | on | | | | | 2004-Apr-21 | | | +----------+-------------+---------+-------------+ | 11.2P | 11.2(26)P6 | | | | | Available | | | | | on | | | | | 2004-Apr-21 | | | +----------+-------------+---------+-------------+ | 11.2SA | 11.2(8)SA6 Vulnerable. Migrate to | | | 12.0 | +----------+-------------+---------+-------------+ | Affected | Rebuild | Interim | Maintenance | | 11.3 | | ** | | | -Based | | | | | Release | | | | +----------+-------------+---------+-------------+ | 11.3 | 11.3 Vulnerable. Migrate to 12.0 | | +-------------+---------+-------------+ | | 11.3(11b)T4 | | | | | Available | | | | | on | | | | | 2004-Apr-21 | | | | +-------------+---------+-------------+ | | 11.3(11e) | | | | | Available | | | | | on | | | | | 2004-Apr-21 | | | +----------+-------------+---------+-------------+ | Affected | Rebuild | Interim | Maintenance | | 12.0 | | ** | | | -Based | | | | | Release | | | | +----------+-------------+---------+-------------+ | 12.0 | 12.0(28) | | | +----------+-------------+---------+-------------+ | 12.0DA | 12.0DA Vulnerable. Migrate to | | | 12.2DA | +----------+-------------------------------------+ | 12.0DB | 12.0DB Vulnerable. Migrate to | | | 12.1DB | +----------+-------------------------------------+ | 12.0DC | 12.0DC Vulnerable. Migrate to | | | 12.1DC | +----------+-------------+---------+-------------+ | 12.0S | 12.0(27)S | | | | +-------------+---------+-------------+ | | 12.0(26)S2 | | | | +-------------+---------+-------------+ | | 12.0(16)S11 | | | | +-------------+---------+-------------+ | | 12.0(24)S5 | | | | +-------------+---------+-------------+ | | 12.0(25)S3 | | | | +-------------+---------+-------------+ | | 12.0(23)S6 | | | +----------+-------------+---------+-------------+ | 12.0SL | 12.0SL Vulnerable. Migrate to 12.0 | | | (23)S3 | +----------+-------------------------------------+ | 12.0ST | 12.0ST Vulnerable. Migrate to 12.0 | | | (26)S2 | +----------+-------------------------------------+ | 12.0SX | 12.0(25)SX4 Not built - contact TAC | +----------+-------------------------------------+ | 12.0SZ | 12.0SZ Vulnerable. Migrate to 12.0 | | | (26)S2 | +----------+-------------------------------------+ | 12.0T | 12.0T Vulnerable. Migrate to 12.1 | +----------+-------------+---------+-------------+ | 12.0W5 | 12.0(28)W5 | | | | | (30) | | | +----------+-------------+---------+-------------+ | 12.0WC | 12.0(5)WC9a | | | | | Available | | | | | on | | | | | 2004-Apr-21 | | | +----------+-------------+---------+-------------+ | 12.0WT | 12.0(13)WT Vulnerable. End of | | | Engineering | +----------+-------------------------------------+ | 12.0WX | 12.0(4)WX Vulnerable. Migrate to | | | 12.0W5 | +----------+-------------------------------------+ | 12.0XA | 12.0(1)XA Vulnerable. Migrate to | | | 12.1 Latest | +----------+-------------------------------------+ | 12.0XB | 12.0(1)XB Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.0XC | 12.0(2)XC Vulnerable. Migrate to | | | 12.1 Latest | +----------+-------------------------------------+ | 12.0XD | 12.0(2)XD Vulnerable. Migrate to | | | 12.1 Latest | +----------+-------------------------------------+ | 12.0XE | 12.0(7)XE Vulnerable. Migrate to | | | 12.1E Latest | +----------+-------------------------------------+ | 12.0XG | 12.0(3)XG Vulnerable. Migrate to | | | 12.1 Latest | +----------+-------------------------------------+ | 12.0XH | 12.0(4)XH Vulnerable. Migrate to | | | 12.1 | +----------+-------------------------------------+ | 12.0XI | 12.0(4)XI Vulnerable. Migrate to | | | 12.1 | +----------+-------------------------------------+ | 12.0XJ | 12.0(4)XJ Vulnerable. Migrate to | | | 12.1 Latest | +----------+-------------------------------------+ | 12.0XK | 12.0(7)XK Vulnerable. Migrate to | | | 12.1T Latest | +----------+-------------------------------------+ | 12.0XL | 12.0(4)XL Vulnerable. Migrate to | | | 12.2 Latest | +----------+-------------------------------------+ | 12.0XM | 12.0(4)XM Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.0XN | 12.0(5)XN Vulnerable. Migrate to | | | 12.1 Latest | +----------+-------------------------------------+ | 12.0XP | 12.0(5.1)XP Vulnerable. Migrate to | | | 12.1 Latest | +----------+-------------------------------------+ | 12.0XQ | 12.0(5)XQ Vulnerable. Migrate to | | | 12.1 Latest | +----------+-------------------------------------+ | 12.0XR | 12.0(7)XR Vulnerable. Migrate to | | | 12.2 Latest | +----------+-------------------------------------+ | 12.0XS | 12.0(5)XS Vulnerable. Migrate to | | | 12.1E Latest | +----------+-------------------------------------+ | 12.0XU | 12.0(5)XU Vulnerable. Migrate to | | | 12.0(5)WC | +----------+-------------------------------------+ | 12.0XV | 12.0(7)XV Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------+---------+-------------+ | Affected | Rebuild | Interim | Maintenance | | 12.1 | | ** | | | -Based | | | | | Release | | | | +----------+-------------+---------+-------------+ | 12.1 | 12.1(20a) | | | | +-------------+---------+-------------+ | | 12.1(4c) | | | | +-------------+---------+-------------+ | | 12.1(22a) | | | +----------+-------------+---------+-------------+ | 12.1AA | 12.1(10)AA Vulnerable. Migrate to | | | 12.2 Latest | +----------+-------------+---------+-------------+ | 12.1AX | 12.1(14)AX | | | +----------+-------------+---------+-------------+ | 12.1AY | 12.1(13)AY Vulnerable. Migrate to | | | 12.1(14)EA1 | +----------+-------------------------------------+ | 12.1DA | 12.2DA Vulnerable. Migrate to | | | 12.2DA | +----------+-------------------------------------+ | 12.1DB | 12.1(5)DB Vulnerable. Migrate to | | | 12.2B | +----------+-------------+---------+-------------+ | 12.1E | 12.1(19)E7 | | | | +-------------+---------+-------------+ | | 12.1(22)E1 | | | | +-------------+---------+-------------+ | | 12.1(11b) | | | | | E14 | | | | +-------------+---------+-------------+ | | 12.1(20)E2 Not built - contact TAC | | +-------------+---------+-------------+ | | 12.1(19)E6 | | | | +-------------+---------+-------------+ | | 12.1(13)E13 | | | | +-------------+---------+-------------+ | | 12.1(8b)E18 | | | | +-------------+---------+-------------+ | | 12.1(14)E10 | | | | +-------------+---------+-------------+ | | 12.1(13)E14 | | | +----------+-------------+---------+-------------+ | 12.1EA | 12.1(20)EA1 | | | +----------+-------------+---------+-------------+ | 12.1EB | 12.1(20)EB | | | +----------+-------------+---------+-------------+ | 12.1EC | 12.1(20)EC | | | +----------+-------------+---------+-------------+ | 12.1EO | 12.1(20)EO | | | | +-------------+---------+-------------+ | | 12.1(19)EO2 | | | | | Available | | | | | on | | | | | 2004-Apr-25 | | | +----------+-------------+---------+-------------+ | 12.1EU | 12.1(20)EU | | | +----------+-------------+---------+-------------+ | 12.1EV | 12.1(12c)EV Vulnerable. Migrate to | | | 12.2(RLS4)S | +----------+-------------+---------+-------------+ | 12.1EW | 12.1(20)EW2 | | | | | Available | | | | | on | | | | | 2004-Apr-21 | | | +----------+-------------+---------+-------------+ | 12.1EX | 12.1EX Vulnerable. Migrate to 12.1 | | | (14)E | +----------+-------------------------------------+ | 12.1EY | 12.1(10)EY Vulnerable. Migrate to | | | 12.1(14)E | +----------+-------------+---------+-------------+ | 12.1T | 12.1(5)T17 | | | +----------+-------------+---------+-------------+ | 12.1XA | 12.1(1)XA Vulnerable. Migrate to | | | 12.1(5)T18 | +----------+-------------------------------------+ | 12.1XB | 12.1(1)XB Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.1XC | 12.1(1)XC Vulnerable. Migrate to | | | 12.2 | +----------+-------------------------------------+ | 12.1XD | 12.1(1)XD Vulnerable. Migrate to | | | 12.2 | +----------+-------------------------------------+ | 12.1XE | 12.1(1)XE Vulnerable. Migrate to | | | 12.1E Latest | +----------+-------------------------------------+ | 12.1XF | 12.1(2)XF Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.1XG | 12.1(3)XG Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.1XH | 12.1(2a)XH Vulnerable. Migrate to | | | 12.2 | +----------+-------------------------------------+ | 12.1XI | 12.1(3a)XI Vulnerable. Migrate to | | | 12.2 Latest | +----------+-------------------------------------+ | 12.1XJ | 12.1(3)XJ Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.1XL | 12.1(3)XL Vulnerable. Migrate to | | | 12.2T Latest | +----------+-------------------------------------+ | 12.1XM | 12.1(5)XM Vulnerable. Migrate to | | | 12.2T Latest | +----------+-------------------------------------+ | 12.1XP | 12.1(3)XP Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.1XQ | 12.1(3)XQ Vulnerable. Migrate to | | | 12.2T Latest | +----------+-------------------------------------+ | 12.1XR | 12.1(5)XR Vulnerable. Migrate to | | | 12.2T Latest | +----------+-------------------------------------+ | 12.1XT | 12.1(3)XT Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.1XU | 12.1(5)XU Vulnerable. Migrate to | | | 12.2T Latest | +----------+-------------------------------------+ | 12.1XV | 12.1(5)XV Vulnerable. Migrate to | | | 12.2XB | +----------+-------------------------------------+ | 12.1YA | 12.1(5)YA Vulnerable. Migrate to | | | 12.2(8)T | +----------+-------------------------------------+ | 12.1YB | 12.1(5)YB Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.1YC | 12.1(5)YC Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.1YD | 12.1(5)YD Vulnerable. Migrate to | | | 12.2(8)T | +----------+-------------------------------------+ | 12.1YE | 12.1(5)YE5 Vulnerable. Migrate to | | | 12.2(2)YC | +----------+-------------------------------------+ | 12.1YF | 12.1(5)YF2 Vulnerable. Migrate to | | | 12.2(2)YC | +----------+-------------------------------------+ | 12.1YH | 12.1(5)YH2 Vulnerable. Migrate to | | | 12.2(13)T | +----------+-------------------------------------+ | 12.1YI | 12.1(5)YI2 Vulnerable. Migrate to | | | 12.2(2)YC | +----------+-------------------------------------+ | 12.1YJ | 12.1(11)YJ Vulnerable. Migrate to | | | 12.1EA Latest | +----------+-------------+---------+-------------+ | Affected | Rebuild | Interim | Maintenance | | 12.2 | | ** | | | -Based | | | | | Release | | | | +----------+-------------+---------+-------------+ | 12.2 | 12.2(19b) | | | | +-------------+---------+-------------+ | | 12.2(16f) | | | | +-------------+---------+-------------+ | | 12.2(21a) | | | | +-------------+---------+-------------+ | | 12.2(23) | | | | +-------------+---------+-------------+ | | 12.2(12i) | | | | +-------------+---------+-------------+ | | 12.2(10g) | | | | +-------------+---------+-------------+ | | 12.2(13e) | | | | +-------------+---------+-------------+ | | 12.2(17d) | | | | +-------------+---------+-------------+ | | 12.2(21b) | | | | +-------------+---------+-------------+ | | 12.2(23a) | | | +----------+-------------+---------+-------------+ | 12.2B | 12.2(2)B - 12.2(4)B7 Vulnerable. | | | Migrate to 12.2(13)T12 | | +-------------------------------------+ | | 12.2(4)B8 AND FWD Vulnerable. | | | Migrate to 12.3(5a)B1 | +----------+-------------+---------+-------------+ | 12.2BC | 12.2(15) | | | | | BC1C | | | +----------+-------------+---------+-------------+ | 12.2BW | 12.2(4)BW Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------+---------+-------------+ | 12.2BX | 12.2(16)BX2 | | | +----------+-------------+---------+-------------+ | 12.2BY | 12.2(4)BY Vulnerable. Migrate to | | | 12.2(15)B | | +-------------------------------------+ | | 12.2(8)BY Vulnerable. Migrate to | | | 12.2(8)ZB | | +-------------------------------------+ | | 12.2(2)BY Vulnerable. Migrate to | | | 12.2(8)BZ | +----------+-------------------------------------+ | 12.2BZ | 12.2(15)BZ Vulnerable. Migrate to | | | 12.2(16)BX | +----------+-------------------------------------+ | 12.2CX | 12.2(11)CX Vulnerable. Migrate to | | | 12.2(15)BC | +----------+-------------------------------------+ | 12.2CY | 12.2(11)CY Vulnerable. Migrate to | | | 12.2(13)BC1C | +----------+-------------------------------------+ | 12.2DD | 12.2DD Vulnerable. Migrate to 12.2 | | | (4)B1 | +----------+-------------------------------------+ | 12.2DX | 12.2(1)DX Vulnerable. Migrate to | | | 12.2DD | | +-------------------------------------+ | | 12.2(2)DX Vulnerable. Migrate to | | | 12.2B Latest | +----------+-------------+---------+-------------+ | 12.2EW | 12.2(18)EW | | | +----------+-------------+---------+-------------+ | 12.2JA | 12.2(13)JA4 | | | | +-------------+---------+-------------+ | | 12.2(13)JA2 | | | | +-------------+---------+-------------+ | | 12.2(11)JA3 | | | +----------+-------------+---------+-------------+ | 12.2MC | 12.2(15) | | | | | MC1B | | | +----------+-------------+---------+-------------+ | 12.2S | 12.2(22)S | | | | +-------------+---------+-------------+ | | 12.2(14)S7 | | | | +-------------+---------+-------------+ | | 12.2(20)S1 | | | | +-------------+---------+-------------+ | | 12.2(20)S3 | | | | | Available | | | | | on | | | | | 2004-Apr-21 | | | | +-------------+---------+-------------+ | | 12.2(18)S3 | | | +----------+-------------+---------+-------------+ | 12.2SE | 12.2(18)SE | | | +----------+-------------+---------+-------------+ | 12.2SW | 12.2(21)SW | | | +----------+-------------+---------+-------------+ | 12.2SX | 12.2(17a) | | | | | SX2 | | | +----------+-------------+---------+-------------+ | 12.2SXA | 12.2(17b) | | | | | SXA1 | | | +----------+-------------+---------+-------------+ | 12.2SXB | 12.2(17d)SXB1 Not built - contact | | | TAC | +----------+-------------+---------+-------------+ | 12.2SY | 12.2(14)SY3 | | | +----------+-------------+---------+-------------+ | 12.2SZ | 12.2(14)SZ6 | | | +----------+-------------+---------+-------------+ | 12.2T | 12.2(15)T11 | | | | +-------------+---------+-------------+ | | 12.2(13)T12 | | | | +-------------+---------+-------------+ | | 12.2(11)T11 Not built - contact TAC | | +-------------+---------+-------------+ | | 12.2(13)T11 | | | +----------+-------------+---------+-------------+ | 12.2XA | 12.2(2)XA Vulnerable. Migrate to | | | 12.2(11)T | +----------+-------------------------------------+ | 12.2XB | 12.2(2)XB Vulnerable. Migrate to | | | 12.2(15)T | +----------+-------------------------------------+ | 12.2XC | 12.2(2)XC Vulnerable. Migrate to | | | 12.2(8)ZB | +----------+-------------------------------------+ | 12.2XD | 12.2(1)XD Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2XE | 12.2(1)XE Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2XF | 12.2(1)XF1 Vulnerable. Migrate to | | | 12.2(4)BC1C | +----------+-------------------------------------+ | 12.2XG | 12.2(2)XG Vulnerable. Migrate to | | | 12.2(8)T | +----------+-------------------------------------+ | 12.2XH | 12.2(2)XH Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2XI | 12.2(2)XI2 Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2XJ | 12.2(2)XJ Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2XK | 12.2(2)XK Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2XL | 12.2(4)XL Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2XM | 12.2(4)XM Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2XN | 12.2(2)XN Vulnerable. Migrate to | | | 12.2(11)T | +----------+-------------------------------------+ | 12.2XQ | 12.2(2)XQ Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2XS | 12.2(1)XS Vulnerable. Migrate to | | | 12.2(11)T | +----------+-------------------------------------+ | 12.2XT | 12.2(2)XT Vulnerable. Migrate to | | | 12.2(11)T | +----------+-------------------------------------+ | 12.2XU | 12.2(2)XU Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2XW | 12.2(4)XW Vulnerable. Migrate to | | | 12.2(13)T12 | +----------+-------------------------------------+ | 12.2YA | 12.2(4)YA Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2YB | 12.2(4)YB Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2YC | 12.2(2)YC Vulnerable. Migrate to | | | 12.2(11)T11 | +----------+-------------------------------------+ | 12.2YD | 12.2(8)YD Vulnerable. Migrate to | | | 12.2(8)YY | +----------+-------------------------------------+ | 12.2YE | 12.2(9)YE Vulnerable. Migrate to | | | 12.2S | +----------+-------------------------------------+ | 12.2YF | 12.2(4)YF Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2YG | 12.2(4)YG Vulnerable. Migrate to | | | 12.2(13)T12 | +----------+-------------------------------------+ | 12.2YH | 12.2(4)YH Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2YJ | 12.2(8)YJ Vulnerable. Migrate to | | | 12.2(15)T12 | +----------+-------------------------------------+ | 12.2YK | 12.2(2)YK Vulnerable. Migrate to | | | 12.2(13)ZC | +----------+-------------------------------------+ | 12.2YL | 12.2(8)YL Vulnerable. Migrate to | | | 12.3(2)T | +----------+-------------------------------------+ | 12.2YM | 12.2(8)YM Vulnerable. Migrate to | | | 12.3(2)T | +----------+-------------------------------------+ | 12.2YN | 12.2(8)YN Vulnerable. Migrate to | | | 12.3(2)T | +----------+-------------------------------------+ | 12.2YO | 12.2(9)YO Vulnerable. Migrate to | | | 12.2(14)SY | +----------+-------------------------------------+ | 12.2YP | 12.2(11)YP Vulnerable. Migrate to | | | 12.2T Latest | +----------+-------------------------------------+ | 12.2YQ | 12.2(11)YQ Vulnerable. Migrate to | | | 12.3(2)T | +----------+-------------------------------------+ | 12.2YR | 12.2(11)YR Vulnerable. Migrate to | | | 12.3(2)T | +----------+-------------------------------------+ | 12.2YS | 12.2(11)YS Vulnerable. Migrate to | | | 12.3T | +----------+-------------------------------------+ | 12.2YT | 12.2(11)YT Vulnerable. Migrate to | | | 12.2(15)T | +----------+-------------------------------------+ | 12.2YU | 12.2(11)YU Vulnerable. Migrate to | | | 12.3(2)T | +----------+-------------------------------------+ | 12.2YV | 12.2(11)YV Vulnerable. Migrate to | | | 12.3(4)T | +----------+-------------------------------------+ | 12.2YW | 12.2(8)YW Vulnerable. Migrate to | | | 12.3(2)T | +----------+-------------------------------------+ | 12.2YX | 12.2(11)YX Vulnerable. Migrate to | | | 12.2(RLS3)S | +----------+-------------------------------------+ | 12.2YY | 12.2(8)YY Vulnerable. Migrate to | | | 12.3(1)T | +----------+-------------------------------------+ | 12.2YZ | 12.2(11)YZ Vulnerable. Migrate to | | | 12.2(14)SZ | +----------+-------------+---------+-------------+ | 12.2ZA | 12.2(14)ZA6 | | | +----------+-------------+---------+-------------+ | 12.2ZB | 12.2(8)ZB Vulnerable. Migrate to | | | 12.3T | +----------+-------------------------------------+ | 12.2ZC | 12.2(13)ZC Vulnerable. Migrate to | | | 12.3T | +----------+-------------+---------+-------------+ | 12.2ZD | 12.2(13)ZD1 | | | +----------+-------------+---------+-------------+ | 12.2ZE | 12.2(13)ZE Vulnerable. Migrate to | | | 12.3 | +----------+-------------------------------------+ | 12.2ZF | 12.2(13)ZF Vulnerable. Migrate to | | | 12.3(4)T | +----------+-------------------------------------+ | 12.2ZG | 12.2(13)ZG Vulnerable. Migrate to | | | 12.3(4)T | +----------+-------------------------------------+ | 12.2ZH | 12.2(13)ZH Vulnerable. Migrate to | | | 12.3(4)T | +----------+-------------------------------------+ | 12.2ZI | 12.2(11)ZI Vulnerable. Migrate to | | | 12.2(18)S | +----------+-------------+---------+-------------+ | 12.2ZJ | 12.2(15)ZJ5 | | | | +-------------+---------+-------------+ | | 12.2(15)ZJ4 | | | +----------+-------------+---------+-------------+ | 12.2ZK | 12.2(15)ZK Vulnerable. Migrate to | | | 12.3T | +----------+-------------------------------------+ | 12.2ZL | 12.2(15)ZL Vulnerable. Migrate to | | | 12.3(7)T | +----------+-------------------------------------+ | 12.2ZN | 12.2(15)ZN Vulnerable. Migrate to | | | 12.3(2)T | +----------+-------------+---------+-------------+ | 12.2ZP | 12.2(13)ZP3 | | | +----------+-------------+---------+-------------+ | Affected | Rebuild | Interim | Maintenance | | 12.3 | | ** | | | -Based | | | | | Release | | | | +----------+-------------+---------+-------------+ | 12.3 | 12.3(3e) | | | | +-------------+---------+-------------+ | | 12.3(6) | | | | +-------------+---------+-------------+ | | 12.3(5b) | | | +----------+-------------+---------+-------------+ | 12.3B | 12.3(5a)B | | | | +-------------+---------+-------------+ | | 12.3(3)B1 | | | +----------+-------------+---------+-------------+ | 12.3BW | 12.3(1a)BW Vulnerable. Migrate to | | | 12.3B | +----------+-------------+---------+-------------+ | 12.3T | 12.3(2)T4 | | | | +-------------+---------+-------------+ | | 12.3(7)T1 Not built - contact TAC | | +-------------+---------+-------------+ | | 12.3(4)T3 | | | +----------+-------------+---------+-------------+ | 12.3XA | 12.3(2)XA Vulnerable. Contact TAC. | +----------+-------------+---------+-------------+ | 12.3XB | 12.3(2)XB2 | | | +----------+-------------+---------+-------------+ | 12.3XC | 12.3(2)XC2 | | | +----------+-------------+---------+-------------+ | 12.3XD | 12.3(4)XD1 | | | +----------+-------------+---------+-------------+ | 12.3XE | 12.3(2)XE Vulnerable. Migrate to | | | 12.3T | +----------+-------------------------------------+ | 12.3XF | 12.3(2)XF Vulnerable. Contact TAC | | | if needed. | +----------+-------------+---------+-------------+ | 12.3XG | 12.3(4)XG | | | +----------+-------------+---------+-------------+ | 12.3XH | 12.3(4)XH | | | +----------+-------------+---------+-------------+ | 12.3XI | 12.3(7)XI Vulnerable. Migrate to | | | 12.3T | +----------+-------------------------------------+ | 12.3XJ | 12.3(7)XJ Vulnerable. Contact TAC | | | if needed | +----------+-------------+---------+-------------+ | 12.3XK | 12.3(4)XK | | | +----------+-------------+---------+-------------+ | 12.3XL | 12.3(7)XL Vulnerable. Contact Tac | | | if needed | +----------+-------------------------------------+ | 12.3XM | 12.3(9)XM Vulnerable. Contact TAC | | | if needed. | +----------+-------------------------------------+ | 12.3XN | 12.3(4)XN Vulnerable. Contact TAC | | | if needed. | +----------+-------------------------------------+ | 12.3XQ | 12.3(4)XQ Vulnerable. Contact TAC | | | if needed. | +----------+-------------------------------------+ | * All dates are estimated and subject to | | change. | | | | ** Interim releases are subjected to less | | rigorous testing than regular maintenance | | releases, and may have serious bugs. | +------------------------------------------------+
Obtaining Fixed Software
Customers with Service Contracts
Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com.
Customers using Third-party Support Organizations
Customers whose Cisco products are provided or maintained through prior or existing agreement with third-party support organizations such as Cisco Partners, authorized resellers, or service providers should contact that support organization for assistance with the upgrade, which should be free of charge.
Customers without Service Contracts
Customers who purchase direct from Cisco but who do not hold a Cisco service contract and customers who purchase through third-party vendors but are unsuccessful at obtaining fixed software through their point of sale should get their upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows.
-
+1 800 553 2447 (toll free from within North America)
-
+1 408 526 7209 (toll call from anywhere in the world)
-
e-mail: tac@cisco.com
See http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional TAC contact information, including special localized telephone numbers and instructions and e-mail addresses for use in various languages.
Please have your product serial number available and give the URL of this notice as evidence of your entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC.
Please do not contact either "psirt@cisco.com" or "security-alert@cisco.com" for software upgrades.
Workarounds
The effectiveness of any workaround is dependent on specific customer situations such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround is the most appropriate for use in the intended network before it is deployed.
There are no workarounds available to mitigate the effects of this vulnerability on Cisco IOS Firewall.
For BGP, we will present the workaround and only a few mitigation techniques. For additional information regarding BGP security risk assessment, mitigation techniques, and deployment best practices, please consult ftp://ftp-eng.cisco.com/cons/isp/security/ BGP-Risk-Assesment-v.pdf.
-
BGP MD5 secret
The workaround for BGP is to configure MD5 secret for each session between peers. This can be configured as shown in the following example: router(config)#router bgp router(config-router)#neighbor password
It is necessary to configure the same shared MD5 secret on both peers and at the same time. Failure to do so will break the existing BGP session and the new session will not get established until the exact same secret is configured on both devices. For a detailed discussion on how to configure BGP, refer to the following document http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/ products_configuration_guide_chapter09186a00800ca571.html . Once the secret is configured, it is prudent to change it periodically. The exact period must fit within your company security policy but it should not be longer than a few months. When changing the secret, again it must be done at the same time on both devices. Failure to do so will break your existing BGP session. The exception is if your Cisco IOS software release contains the integrated CSCdx23494 ( registered customers only) fix. With this fix, the BGP session will not be terminated when the MD5 secret is changed only on one side. The BGP updates, however, will not be processed until either the same secret is configured on both devices or the secret is removed from both devices.
It is possible to mitigate the exposure for BGP on this vulnerability by applying one or more of the following measures which will lessen the potential for the necessary spoofing required to implement a successful attack:
-
Blocking access to the core infrastructure
Although it is often difficult to block traffic transiting your network, it is possible to identify traffic which should never be allowed to target your infrastructure devices and block that traffic at the border of your network. Infrastructure access control lists (ACLs) are considered a network security best practice and should be considered as a long-term addition to good network security as well as a workaround for this specific vulnerability. The white paper entitled "Protecting Your Core: Infrastructure Protection Access Control Lists", available at http://www.cisco.com/warp/public/707/ iacl.html, presents guidelines and recommended deployment techniques for infrastructure protection ACLs. Exceptions would include any devices which have a legitimate reason to access your infrastructure (for example, BGP peers, NTP sources, DNS serves, and so on). All other traffic must be able to traverse your network without terminating on any of your devices.
-
Configure anti-spoofing measures on the network edge In order for an adversary to use the attack vector described in this advisory, it must send packets with the source IP address equal to one of the BGP peers. You can block spoofed packets either using the Unicast Reverse Path Forwarding (uRPF) feature or by using access control lists (ACLs). By enabling uRPF, all spoofed packets will be dropped at the first device. To enable uRPF, use the following commands: router(config)#ip cef
router(config)#ip verify unicast reverse-path
Please consult http://www.cisco.com/en/US/products/sw/iosswrel/ps1835 /products_configuration_guide_chapter09186a00800ca7d4.html and ftp:// ftp-eng.cisco.com/cons/isp/security/URPF-ISP.pdf for further details on how uRPF works and how to configure it in various scenarios. This is especially important if you are using asymmetric routing. ACLs should also be deployed as close to the edge as possible. Unlike uRPF, you must specify the exact IP range that is permitted. Specifying which addresses should be blocked is not the optimal solution because it tends to be harder to maintain.
Caution: In order for anti-spoofing measures to be effective, they must be deployed at least one hop away from the devices which are being protected. Ideally, they will be deployed at the network edge facing your customers.
-
Packet rate limiting RST packets are rate-limited in Cisco IOS software by default. This feature is introduced in Cisco IOS Software Release 10.2. In the case of a storm of RST packets, they are effectively limited to one packet per second. In order to be successful, an attacker must terminate connection with the first few packets. Otherwise, the attack is deemed to be impracticably long. On the other hand, SYN packets are not rate-limited in any way. Rate limiting can be accomplished either by using Committed Access Rate (CAR) or by Control Plane Policing (CPP). While CPP is the recommended approach, it is available only for Cisco IOS Software Releases 12.2(18)S and 12.3(4)T. It is currently supported only on the following routers: 1751, 2600/2600-XM, 3700, 7200, and 7500 Series.
CAR can be configured as follows:
router(config)#access-list 103 deny tcp any host 10.1.1.1 established router(config)#access-list 103 permit tcp any host 10.0.0.1 router(config)#interface <interface> <interface #> router(config-if)#rate-limit input access-group 103 8000 8000 8000 conform-action transmit exceed-action drop
For details on how to configure and deploy CPP, please consult the following document http://www.cisco.com/en/US/products/sw/iosswrel/ ps1838/products_white_paper09186a0080211f39.shtml
Exploitation and Public Announcements
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory.
The exploitation of the vulnerability with packets having RST flag set (reset packets) was discovered by Paul (Tony) Watson of OSVDB.org. The extension of the attack vector to packets with SYN flag was discovered by the vendors cooperating on the resolution of this issue.
Status of This Notice: INTERIM
This is a INTERIM advisory. Although Cisco cannot guarantee the accuracy of all statements in this advisory, all of the facts have been checked to the best of our ability. Cisco does not anticipate issuing updated versions of this advisory unless there is some material change in the facts. Should there be a significant change in the facts, Cisco may update this advisory.
A stand-alone copy or Paraphrase of the text of this Security Advisory that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors.
Distribution
This advisory will be posted on Cisco's worldwide website at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml.
In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients.
-
cust-security-announce@cisco.com
-
first-teams@first.org (includes CERT/CC)
-
bugtraq@securityfocus.com
-
vulnwatch@wulnwatch.org
-
cisco@spot.colorado.edu
-
cisco-nsp@puck.nether.net
-
full-disclosure@lists.netsys.com
-
comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates.
Revision History
+----------+-------------+----------------+ | Revision | 2004-Apr-20 | Initial public | | 1.0 | | release. | +----------+-------------+----------------+
Cisco Security Procedures
Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/warp/public/707/ sec_incident_response.shtml. This includes instructions for press inquiries regarding Cisco Security Notices. All Cisco Security Advisories are available at http://www.cisco.com/go/psirt.
All contents are Copyright \xa9 1992-2004 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (Cygwin)
iD8DBQFAhZTpezGozzK2tZARAkKXAJ9BWwuytT7zwoOL+RkZJPebYN3W3ACfV/+K 0Fd3MvvRlKSETCrlMGL/dZg= =eDSn -----END PGP SIGNATURE----- .
The nonexhaustive list of vulnerable non-IOS based Cisco products is as follows:
-
Access Registrar
-
BPX, IGX, MGX WAN switches, and the Service Expansion Shelf
-
BR340, WGB340, AP340, AP350, BR350 Cisco/Aironet wireless products
-
Cache Engine 505 and 570
-
CallManager
-
Catalyst 1200, 1900, 28xx, 29xx, 3000, 3900, 4000, 5000, 6000
-
Cisco 8110 Broadband Network Termination Unit
-
Cisco Element Management Framework
-
Cisco Info Center
-
Cisco Intelligent Contact Management
-
Cisco MDS 9000
-
Cisco ONS 15190/15194 IP Transport Concentrator
-
Cisco ONS 15327 Metro Edge Optical Transport Platform
-
Cisco ONS 15454 Optical Transport Platform
-
Cisco ONS 15531/15532 T31 OMDS Metro WDM System
-
Cisco ONS 15800/15801/15808 Dense Wave Division Multiplexing Platform
-
Cisco ONS 15830 T30 Optical Amplification System
-
Cisco ONS 15831/15832 T31 DWDM System
-
Cisco ONS 15863 T31 Submarine WDM System
-
Content Router 4430 and Content Delivery Manager 4630 and 4650
-
Cisco Secure Intrusion Detection System (NetRanger) appliance and IDS Module
-
Cisco Secure PIX firewall
-
Cisco ws-x6608 and ws-x6624 IP Telephony Modules
-
CiscoWorks Windows
-
Content Engine 507, 560, 590, and 7320
-
CSS11000 (Arrowpoint) Content Services Switch
-
Hosting Solution Engine
-
User Registration Tool VLAN Policy Server
-
Cisco FastHub 300 and 400
-
CR-4430-B
-
Device Fault Manager
-
Internet CDN Content Engine 590 and 7320, Content Distribution Manager 4670, and Content Router 4450
-
IP Phone (all models including ATA and VG248)
-
IP/TV
-
LightStream 1010
-
LightStream 100 ATM Switches
-
LocalDirector
-
ME1100 series
-
MicroHub 1500,MicroSwitch 1538/1548
-
Voice Manager
-
RTM
-
SN5400 series storage routers
-
Switch Probe
-
Unity Server
-
VG248 Analog Phone Gateway
-
Traffic Director
-
WAN Manager
Products Confirmed Not Vulnerable
The following products are not vulnerable:
-
Cisco VPN 3000 Series Concentrators
-
Cisco Firewall Services Module for Cisco Catalyst 6500 Series and Cisco 7600 Series (FWSM)
Details
TCP is the transport layer protocol designed to provide connection-oriented reliable delivery of a data stream. The Cisco PSIRT has analyzed multiple TCP-based protocols, as they are used within our offering, and we believe that this vulnerability does not have a significant impact on them. We will present our analysis for a few protocols which have the potential for higher impact due to the long lived connections.
Voice signaling H.225, H.245 (part of H.323 suite)
H.225 and H.245 protocols are used in voice signaling. Their purpose is to negotiate parameters for content transfer (voice or video). The established sessions persist for the duration of a call. Any call in progress is terminated when the signaling session is broken. A new signaling session will be established immediately for the new call, but terminated calls cannot be re-established.
Each call from an IP telephone or softphone will result in the creation of a single signaling session. It is possible that a single signaling session is responsible for multiple calls, but that setup is used deeper within the Service Provider's network. Determining all necessary parameters for mounting an attack is deemed a non-trivial task if the network is designed according to the current best practices.
Network Storage (iSCSI, FCIP)
Network Storage products use two TCP-based protocols: SCSI over IP (iSCSI) and Fiber Channel over IP (FCIP).
-
SCSI over IP (iSCSI)
iSCSI is used in a client/server environment. The client is your computer and it is only the client that initiates a connection. This connection is not shared with any other users. Terminating the session will not have any adverse consequences if people are using current drivers from Microsoft for Windows and from Cisco for Linux. These drivers will re-establish the session and continue transfer from the point where it was disconnected. Drivers from other vendors may behave differently.
The user may notice that access to a virtual device is slightly slower than usual.
-
Fiber Channel over IP (FCIP)
FCIP is a peer-to-peer protocol. It is used for mirroring data between switches. Each peer can initiate the session. Switches can, and should be in practice, configured in a mesh. Bringing one link down will cause traffic to be re-routed over other link(s). If an adversary can manage to terminate the session multiple times in a row, the user's application may terminate with a "Device unreachable" or similar error message. This does not have any influence on the switch itself and the user can retry the operation.
The user may notice that access to a virtual device is slightly slower than usual. An occasional error message is possible. SSL/TLS connections can be used to encapsulate various kinds of traffic and these sessions can be long lived. An encrypted session can be attacked either on the originating or terminating host or on the firewalls in front of them (if they exist). | | | | Customers | | | | are | | | | encouraged | | | | to migrate | | | | to IOS.
NISCC Vulnerability Advisory 236929
NISCC Vulnerability Advisory 236929
Vulnerability Issues in TCP
Version Information
Advisory Reference 236929 Release Date 20 April 2004 Last Revision 22 April 2004 Version Number 1.4
What is Affected?
The vulnerability described in this advisory affects implementations of the Transmission Control Protocol (TCP) that comply with the Internet Engineering Task Force\x92s (IETF\x92s) Requests For Comments (RFCs) for TCP, including RFC 793, the original specification, and RFC 1323, TCP Extensions for High Performance.
TCP is a core network protocol used in the majority of networked computer systems today. Many vendors include support for this protocol in their products and may be impacted to varying degrees.
Severity
The impact of this vulnerability varies by vendor and application, but in some deployment scenarios it is rated critical. Alternatively contact your vendor for product specific information.
If exploited, the vulnerability could allow an attacker to create a Denial of Service condition against existing TCP connections, resulting in premature session termination. The resulting session termination will affect the application layer, the nature and severity of the effects being dependent on the application layer protocol. The primary dependency is on the duration of the TCP connection, with a further dependency on knowledge of the network (IP) addresses of the end points of the TCP connection.
The Border Gateway Protocol (BGP) is judged to be potentially most affected by this vulnerability.
BGP relies on a persistent TCP session between BGP peers. Resetting the connection can result in medium term unavailability due to the need to rebuild routing tables and route flapping. Route flapping may result in route dampening (suppression) if the route flaps occur frequently within a short time interval. The overall impact on BGP is likely to be moderate based on the likelihood of successful attack. If the TCP MD5 Signature Option and anti-spoofing measures are used then the impact will be low as these measures will successfully mitigate the vulnerability.
There is a potential impact on other application protocols such as DNS (Domain Name System) and SSL (Secure Sockets Layer) in the case of zone transfers and ecommerce transactions respectively, but the duration of the sessions is relatively short and the sessions can be restarted without medium term unavailability problems. In the case of SSL it may be difficult to guess the source IP address.
Data injection may be possible. However, this has not been demonstrated and appears to be problematic. The reason for this is that the receiving TCP implementation checks the sequence number of the RST or SYN packet, which is a 32 bit number, giving a probability of 1/232 of guessing the sequence number correctly (assuming a random distribution).
The discoverer of the practicability of the RST attack was Paul A. Watson, who describes his research in his paper \x93Slipping In The Window: TCP Reset Attacks\x94, presented at the CanSecWest 2004 conference. In a RST/ACK packet an acknowledgement number is included in the packet, although it is not checked by the receiving TCP implementation.)
RFC 793, p36, states the following:
"In all states except SYN-SENT, all reset (RST) segments are validated by checking their SEQ-fields [sequence numbers]. In the SYN-SENT state (a RST received in response to an initial SYN), the RST is acceptable if the ACK field acknowledges the SYN."
Resets must be processed immediately. RFC 793, p25, says "[\x85] [E]ven when the receive window is zero, a TCP must process the RST and URG fields of all incoming segments."
It is also possible to perform the same attack with SYN (synchronise) packets. RFC 793, p31 states:
\x93The principle reason for the three-way handshake is to prevent old duplicate connection initiations from causing confusion. To deal with this, a special control message, reset, has been devised. [\x85] If the TCP is in one of the synchronized states (ESTABLISHED, FIN-WAIT-1, FIN-WAIT-2, CLOSE-WAIT, CLOSING, LAST-ACK, TIME-WAIT), it aborts the connection and informs its user.\x94
TCP window sizes are negotiated in the initial 3-way handshake used to set up a TCP connection, with higher values serving to improve throughput in some circumstances. Vendor-chosen defaults also influence the selection. An attacker seeking to disrupt an existing TCP connection must supply the 4-tuple correctly. As the source port varies, additional work is generally called for on the part of the attacker. However, research (referenced below) has shown that the process of source port selection on many platforms includes predictable elements, so that the attack remains practicable. By weighting 'likely' source port values carefully, an attacker can disrupt TCP implementations that employ a range of window sizes.
Application layer protocols that are critically affected are those that:
\x95 Depend on long lived TCP connections \x95 Have known or easy-to-guess IP address end points \x95 Have easy to an easy-to-guess source TCP port
As noted above BGP does use long lived TCP connections, and the IP addresses and
source port (and destination port) are sometimes available through the use of
BGP looking glasses (multi-source, multi-destination trace route tools) or DNS
resource records. Using \x93trace route\x94 commands can provide information on
peering point IP addresses. Thus BGP is likely to be critically affected by the
TCP vulnerability.
These denial of service attacks can be carried out by single machine, or by
multiple co-operating systems (to form a distributed denial of service attack).
It is also possible to inject packets, which will be processed if they are in
the window. The difficulty with data injection attacks is that the receiving TCP
implementation will reassemble the packets received according to sequence
number, dropping any duplicate packets.
Vendor specific information will be released as it becomes available and if vendor permission has been received. Subscribers are advised to check the following URL regularly for updates:
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
[Please note that updates to this advisory will not be notified by email.]
This vulnerability has been assigned the CVE
name
CAN-2004-0230.
The Open Source Vulnerability Database ID
number for this vulnerability is
4030.
Mitigation
The following mitigation steps are still being evaluated and may be incomplete.
Customers should work with vendors for the workaround most appropriate for the
product in question.
In the absence of vendor patching of the TCP implementation, the following are
general mitigating steps:
\x95
Implement IP Security (IPSEC) which will encrypt traffic at the network layer,
so TCP information will not be visible
\x95
Reduce the TCP window size (although this could increase
traffic loss and subsequent retransmission)
\x95
Do not publish TCP source port information
It should be noted that IPSEC provides confidentiality and authentication
services at the network layer, and can provide a measure of trust in the
authenticity of the end points as well as encryption of traffic between the end
points. However, in the context of the current attack IPSEC will reject
RST and SYN packets that are not part of a secure IP packet stream.
To change the TCP window size, in some Unix variants you can set a value of the
default TCP windows size by using the \x93sysctl\x94 program (\x93ndd -set\x94 in the case
of Sun Solaris). In the case of Microsoft Windows NT/2000/XP/2003, the default
window size can be changed by modifying the value of the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
key. As noted above, great care should be exercised when altering the default
TCP window size as network performance could be adversely affected.
In the case of BGP, the following may counter the problem:
\x95
Implement ingress and egress filtering to check that the
traffic entering or leaving the network has a source IP address that is
expected on the router/firewall interface that receives the traffic
\x95
Implement the TCP MD5 Signature Option to checksum the TCP
packet carrying the BGP application data (see RFC 2385),
being careful to set and maintain strong (i.e. difficult to guess) passwords to
which the MD5 checksum is applied. Also see
RFC 3562 which discusses
the security requirements of this keying material.
\x95
Limit the amount of information available through looking
glasses and DNS resource records, being careful not to expose TCP port
information unnecessarily
The IETF ingress filtering standard is defined in
RFC 2827.
A discussion of egress filtering can be found at
http://www.sans.org/y2k/egress.htm.
The use of the TCP MD5 Signature Option will prevent the exploitation of this
vulnerability. Router customers should implement this on all BGP peering points
if it is supported by the router, upgrading the router firmware if necessary.
Solution
Please refer to the Vendor Information section of this advisory for
implementation specific remediation.
Some vendors will have reduced the
likelihood of successful denial of service by amending the TCP implementation to
issue a further acknowledgment packet challenge for RST and SYN packets that do
not have exactly the expected sequence number.
The Internet Engineering Task Force (IETF) has
published an Internet Draft to co-incide
with the release of this advisory.
The text of this draft is available from
the IETF web site:
http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt
NISCC has produced best practice guidelines for BGP available at
http://www.niscc.gov.uk/BGP Filtering Guide.pdf
Secure configuration templates for BGP implementations on Cisco IOS and Juniper JUNOS can be found at:
\x95
Cisco
http://www.cymru.com/Documents/secure-bgp-template.html
\x95
Juniper
http://www.qorbit.net/documents/junos-bgp-template.pdf
Guidance on tuning of the IP stack for a number of different UNIX operating systems is available at
http://www.cymru.com/Documents/ip-stack-tuning.html
Vendor Information
The following vendors have provided information about how their products are affected
by these vulnerabilities.
Please note that JPCERT/CC have released a Japanese language advisory for this vulnerability
which contains additional information regarding Japanese vendors. This advisory is available at
http://www.jpcert.or.jp/at/2004/at040003.txt.
Certicom Certicom has examined the National Infrastructure Security Coordination Centre (NISCC) advisory and determined it is not vulnerable.
Certicom Developer Toolkits for SSL (SSL Plus, SSL Plus for Java, Security Builder SSL-C and Security Builder SSL-J) do not provide a TCP/IP transport mechanism, but rather utilize the supported operating system's TCP/IP stack. The vulnerability is against the TCP/IP stack itself, and not directly against the functionality offered by Certicom toolkits. Therefore, there is no patch or workaround that can be implemented within Certicom products. The patch or workaround must be provided by the operating system vendor.
Customers are urged to contact their operating system vendors to determine if they have provided a workaround to this advisory. If you have any further questions please do not hesitate to contact support@certicom.com. Check Point The latest release for VPN-1/FireWall-1 (R55 HFA-03) contains a protection against this vulnerability. The protection applies to both the firewall device and to hosts behind the firewall.
Please refer to the Check Point web site for further information at:
http://www.checkpoint.com/techsupport/alerts/tcp_dos.html. Cisco Cisco Systems is addressing the vulnerabilities identified by NISCC Vulnerability Advisory 236929 across its entire product line. Cisco has released two related advisories:
TCP Vulnerabilities in Multiple IOS-Based Cisco Products
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
TCP Vulnerabilities in Multiple Non-IOS Cisco Products
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml Cray Inc Cray Inc. is vulnerable on their UNICOS, UNICOS/mk and UNICOS/mp systems. Spr's have been opened to track this issue. Please contact your local Cray Service Representative for more information. Hitachi Hitachi is investigating the potential impact to Hitachi's products. Innovaphone Not vulnerable. Internet Initiative Japan, Inc (IIJ) IIJ will release a new firmware to fix this vulnerability. Details are available on their web site at http://www.seil.jp/en/ann/announce_en_20040421_01.txt. InterNiche === NicheStack v2.0 TCP/IP ===
InterNiche Technologies has updated its NicheStack v2.0 TCP/IP product to handle the scenarios described in NISCC Vulnerability Notice #236929. The patch is available to all InterNiche customers in accordance with the terms of their current support agreements.
More information can be found on www.iNiche.com or through support@iNiche.com
=== NicheLite v2.0 TCP/IP ===
InterNiche Technologies has updated its NicheLite v2.0 TCP/IP product to handle the scenarios described in NISCC Vulnerability Notice #236929. The patch is available to all InterNiche customers in accordance with the terms of their current support agreements.
More information can be found on www.iNiche.com or through support@iNiche.com Juniper Networks Juniper Networks products are susceptible to this vulnerability. Customers should contact Juniper Networks Technical Assistance Center for availability and download instructions.
Additional information is posted on our web site at https://www.juniper.net/support. Lucent Technologies Lucent Technologies is aware of this vulnerability advisory and is investigating any potential impact to its product portfolio. As further information becomes available, Lucent will provide information directly to its customers, if appropriate. Mitel Networks Mitel is aware of the vulnerability and is working with the vendors of our underlying networking software to assess the impact and, if necessary, determine potential solutions. When more information becomes available, an advisory will be issued. Please contact 'security@mitel.com' if you have specific questions. MRLG A new version of the Multi-Router Looking Glass tool (4.3.0) has been released. This includes a patch that prevents a remote user from utilising the "sh ip bgp neighbors" functionality. This new version is available from ftp://ftp.enterzone.net/looking-glass/CURRENT/. NEC NEC is aware of this vulnerability and is trying to determine potential impacts on our products. Nortel Networks Nortel Networks has evaluated this issue and testing has confirmed that it is possible to successfully exploit this vulnerability. However, the preconditions for a successful exploitation require levels of access to the network that are unlikely to be achieved in a normal network operating environment; furthermore, such levels of access would enable other forms of attack with much greater impact than that achievable by exploiting this vulnerability.
Nortel Networks is continuing to validate that this vulnerability has no serious consequences for Nortel equipment, and will update this statement periodically. Polycom Polycom has investigated the potential impact to our products for NISCC Advisory 236929.
Specific product information will be provided at http://www.polycom.com/securitycenter. Secure Computing Corporation The Sidewinder and Sidewinder G2 firewalls offer protection against this attack at all releases. As application-layer firewalls, Sidewinder and Sidewinder G2 offer protection to systems behind the firewall as well as protecting management connections to the firewall. Yamaha Pending.
Acknowledgements
NISCC wishes to thank the following:
\x95 Steve Bellovin, Rob Thomas and Paul Watson for their contributions to this advisory. \x95 Cisco Systems Inc. and Juniper Networks Inc. for their help with the content of this advisory and for their support during the disclosure process. \x95 JPCERT/CC for their assistance in co-ordinating this disclosure in Japan.
References
Internet Engineering Task Force RFC 793 Transmission Control Protocol http://www.ietf.org/rfc/rfc793.txt RFC 1323 TCP Extensions for High Performance http://www.ietf.org/rfc/rfc1323.txt RFC 1771 A Border Gateway Protocol 4 (BGP-4) http://www.ietf.org/rfc/rfc1771.txt RFC 2385 Protection of BGP Sessions via the TCP MD5 Signature Option http://www.ietf.org/rfc/rfc2385.txt RFC 2827 Network Ingress Filtering http://www.ietf.org/rfc/rfc2827.txt RFC 3562 Considerations for the TCP MD5 Signature Option http://www.ietf.org/rfc/rfc3562.txt RFC 3682 Generalized TTL Security Mechanism http://www.ietf.org/rfc/rfc3682.txt Internet Draft - Transmission Control Protocol security considerations http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt NISCC Best Practice Guidelines - Border Gateway Protocol http://www.niscc.gov.uk/BGP Filtering Guide.pdf Configuration and Tuning Guides Secure BGP Template for Cisco IOS http://www.cymru.com/Documents/secure-bgp-template.html JUNOS Secure BGP Template http://www.qorbit.net/documents/junos-bgp-template.pdf UNIX IP Stack Tuning Guide http://www.cymru.com/Documents/ip-stack-tuning.html Other Documents SANS discussion on egress filtering http://www.sans.org/y2k/egress.htm Vulnerability Databases Common Vulnerabilities and Exposures (CVE) http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0230 Open Source Vulnerability Database (OSVDB) http://www.osvdb.org/displayvuln.php?osvdb_id=4030
Contact Information
The NISCC Vulnerability Management Team can be contacted as follows:
(Please quote the advisory reference in the subject line.) Telephone +44 (0)20 7821 1330 Extension 4511
(Monday to Friday 08:30 - 17:00) Fax +44 (0)20 7821 1686 Post Vulnerability Management Team
NISCC
PO Box 832
London
SW1P 1BG
We encourage those who wish to communicate via email to make use of our PGP key. This is available from http://www.uniras.gov.uk/UNIRAS.asc.
Please note that UK government protectively marked material should not be sent to the email address above.
If you wish to be added to our email distribution list, please email your request to uniras@niscc.gov.uk.
What is NISCC?
For further information regarding the UK National Infrastructure Security Co-Ordination Centre, please visit the NISCC web site at:
http://www.niscc.gov.uk/aboutniscc/index.htm
Reference to any specific commercial product, process or service by trade name, trademark manufacturer or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by NISCC. The views and opinions of authors expressed within this notice shall not be used for advertising or product endorsement purposes.
Neither shall NISCC accept responsibility for any errors or omissions contained within this advisory. In particular, they shall not be liable for any loss or damage whatsoever, arising from or in connection with the usage of information contained within this notice.
\xa9 2004 Crown Copyright
Revision History
April 20, 2004: Initial release (1.0) April 21, 2004: Corrected hyperlinks (1.1) Inserted impact statement for Cisco (1.1) Inserted impact statement for Mitel (1.1) Inserted MRLG patch reference (1.2) April 22, 2004: Revised impact statement for Certicom (1.3) Inserted impact statement for Nortel Networks (1.3) Inserted impact statement for Secure Computing Corporation (1.3) Inserted references section (1.4) Inserted impact statement for Lucent Technologies (1.4)
<End of NISCC Vulnerability Advisory>
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
============================================================================= FreeBSD-SA-14:19.tcp Security Advisory The FreeBSD Project
Topic: Denial of Service in TCP packet processing
Category: core Module: inet Announced: 2014-09-16 Credits: Jonathan Looney (Juniper SIRT) Affects: All supported versions of FreeBSD. Corrected: 2014-09-16 09:48:35UTC (stable/10, 10.1-PRERELEASE) 2014-09-16 09:48:35 UTC (stable/10, 10.1-BETA1-p1) 2014-09-16 09:50:19 UTC (releng/10.0, 10.0-RELEASE-p9) 2014-09-16 09:49:11 UTC (stable/9, 9.3-STABLE) 2014-09-16 09:50:19 UTC (releng/9.3, 9.3-RELEASE-p2) 2014-09-16 09:50:19 UTC (releng/9.2, 9.2-RELEASE-p12) 2014-09-16 09:50:19 UTC (releng/9.1, 9.1-RELEASE-p19) 2014-09-16 09:49:11 UTC (stable/8, 8.4-STABLE) 2014-09-16 09:50:19 UTC (releng/8.4, 8.4-RELEASE-p16) CVE Name: CVE-2004-0230
For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . New TCP connections are initiated using special SYN flag in a datagram. Sequencing of data is controlled by 32-bit sequence numbers, that start with a random value and are increased using modulo 232 arithmetic. In case one of the two port numbers is unknown, a successful attack requires less than 217 packets spoofed, which can be generated within less than a second on a decent connection to the Internet. Workaround
It is possible to defend against these attacks with stateful traffic inspection using a firewall. This can be done by enabling pf(4) on the system and creating states for every connection. Even a default ruleset to allow all traffic would be sufficient to mitigate this issue.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.
2) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.
fetch http://security.FreeBSD.org/patches/SA-14:19/tcp.patch
fetch http://security.FreeBSD.org/patches/SA-14:19/tcp.patch.asc
gpg --verify tcp.patch.asc
b) Apply the patch. Execute the following commands as root:
cd /usr/src
patch < /path/to/patch
c) Recompile your kernel as described in and reboot the system.
3) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:
freebsd-update fetch
freebsd-update install
VI. Correction details
The following list contains the correction revision numbers for each affected branch.
Branch/path Revision
stable/8/ r271668 releng/8.4/ r271669 stable/9/ r271668 releng/9.1/ r271669 releng/9.2/ r271669 releng/9.3/ r271669 stable/10/ r271667 releng/10.0/ r271669
To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:
svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
VII
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-200408-0145", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "catalyst csx", scope: "eq", trust: 2.4, vendor: "cisco", version: "60005.3", }, { model: "solaris", scope: "eq", trust: 2.1, vendor: "oracle", version: "11", }, { model: "solaris", scope: "eq", trust: 2.1, vendor: "oracle", version: "10", }, { model: "netbsd", scope: "eq", trust: 2.1, vendor: "netbsd", version: "2.0", }, { model: "netbsd", scope: "eq", trust: 2.1, vendor: "netbsd", version: "1.6.2", }, { model: "netbsd", scope: "eq", trust: 2.1, vendor: "netbsd", version: "1.6.1", }, { model: "netbsd", scope: "eq", trust: 2.1, vendor: "netbsd", version: "1.6", }, { model: "netbsd", scope: "eq", trust: 2.1, vendor: "netbsd", version: "1.5.3", }, { model: "netbsd", scope: "eq", trust: 2.1, vendor: "netbsd", version: "1.5.2", }, { model: "netbsd", scope: "eq", trust: 2.1, vendor: "netbsd", version: "1.5.1", }, { model: "netbsd", scope: "eq", trust: 2.1, vendor: "netbsd", version: "1.5", }, { model: "unixware", scope: "eq", trust: 1.6, vendor: "xinuos", version: "7.1.1", }, { model: "unixware", scope: "eq", trust: 1.6, vendor: "xinuos", version: "7.1.3", }, { model: "vpn concentrator", scope: "ne", trust: 1.5, vendor: "cisco", version: "30002.5.2", }, { model: "nexland isb soho firewall appliance", scope: null, trust: 1.1, vendor: "symantec", version: null, }, { model: "aix", scope: "eq", trust: 1.1, vendor: "ibm", version: "5.3", }, { model: "aix", scope: "eq", trust: 1.1, vendor: "ibm", version: "5.2", }, { model: "aix", scope: "eq", trust: 1.1, vendor: "ibm", version: "5.1", }, { model: "wan manager", scope: null, trust: 1.1, vendor: "cisco", version: null, }, { model: "vg248 analog phone gateway", scope: null, trust: 1.1, vendor: "cisco", version: null, }, { model: "traffic director", scope: null, trust: 1.1, vendor: "cisco", version: null, }, { model: "rtm", scope: null, trust: 1.1, vendor: "cisco", version: null, }, { model: "pix firewall", scope: "eq", trust: 1.1, vendor: "cisco", version: "6.3", }, { model: "pix firewall", scope: "eq", trust: 1.1, vendor: "cisco", version: "6.2", }, { model: "pix firewall", scope: "eq", trust: 1.1, vendor: "cisco", version: "6.1", }, { model: "pix firewall", scope: "eq", trust: 1.1, vendor: "cisco", version: "6.0", }, { model: "lightstream", scope: "eq", trust: 1.1, vendor: "cisco", version: "1010", }, { model: "ios", scope: "eq", trust: 1.1, vendor: "cisco", version: "12.3", }, { model: "ios", scope: "eq", trust: 1.1, vendor: "cisco", version: "12.2", }, { model: "ios", scope: "eq", trust: 1.1, vendor: "cisco", version: "12.1", }, { model: "ios", scope: "eq", trust: 1.1, vendor: "cisco", version: "12.0", }, { model: "ios", scope: "eq", trust: 1.1, vendor: "cisco", version: "11.3", }, { model: "ios", scope: "eq", trust: 1.1, vendor: "cisco", version: "11.2", }, { model: "ios", scope: "eq", trust: 1.1, vendor: "cisco", version: "11.1", }, { model: "element management framework", scope: null, trust: 1.1, vendor: "cisco", version: null, }, { model: "content router", scope: "eq", trust: 1.1, vendor: "cisco", version: "4450", }, { model: "content router", scope: "eq", trust: 1.1, vendor: "cisco", version: "4430", }, { model: "content engine", scope: "eq", trust: 1.1, vendor: "cisco", version: "560", }, { model: "content engine", scope: "eq", trust: 1.1, vendor: "cisco", version: "507", }, { model: "channel port adapter", scope: null, trust: 1.1, vendor: "cisco", version: null, }, { model: "channel interface processor", scope: null, trust: 1.1, vendor: "cisco", version: null, }, { model: "call manager", scope: null, trust: 1.1, vendor: "cisco", version: null, }, { model: "access registrar", scope: null, trust: 1.1, vendor: "cisco", version: null, }, { model: "network data loss prevention", scope: "lte", trust: 1, vendor: "mcafee", version: "8.6", }, { model: "network data loss prevention", scope: "eq", trust: 1, vendor: "mcafee", version: "9.2.1", }, { model: "junos", scope: "eq", trust: 1, vendor: "juniper", version: "*", }, { model: "openpgp", scope: "eq", trust: 1, vendor: "openpgp", version: "2.6.2", }, { model: "network data loss prevention", scope: "eq", trust: 1, vendor: "mcafee", version: "9.2.2", }, { model: "openserver", scope: "eq", trust: 1, vendor: "xinuos", version: "5.0.6", }, { model: "network data loss prevention", scope: "eq", trust: 1, vendor: "mcafee", version: "9.2.0", }, { model: "openserver", scope: "eq", trust: 1, vendor: "xinuos", version: "5.0.7", }, { model: "catalyst", scope: "eq", trust: 0.9, vendor: "cisco", version: "60006.1", }, { model: "catalyst", scope: "eq", trust: 0.9, vendor: "cisco", version: "60005.5", }, { model: "catalyst", scope: "eq", trust: 0.9, vendor: "cisco", version: "50006.1", }, { model: "catalyst", scope: "eq", trust: 0.9, vendor: "cisco", version: "40006.1", }, { model: "catalyst", scope: "eq", trust: 0.9, vendor: "cisco", version: "40005.1", }, { model: null, scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "nortel", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "redback", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "sun microsystems", version: null, }, { model: "ciscoworks voice manager", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "seil/turbo", scope: "lt", trust: 0.8, vendor: "internet initiative", version: "ver.1.19 earlier firmware", }, { model: "firewall services module", scope: "eq", trust: 0.8, vendor: "cisco", version: "cisco 7600 for series )", }, { model: "systems parallel channel port adapter", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "seil/neu", scope: "lt", trust: 0.8, vendor: "internet initiative", version: "t1 ver.1.90 earlier ver.1.x firmware", }, { model: "sanrise", scope: "eq", trust: 0.8, vendor: "hitachi", version: "9500v series", }, { model: "catalyst 2900 series", scope: "eq", trust: 0.8, vendor: "cisco", version: "2948g-ge-tx", }, { model: "gateway security 300 series", scope: null, trust: 0.8, vendor: "symantec", version: null, }, { model: "ws-x6624-fxs", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "mgx 8230 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "ons 15500 series", scope: "eq", trust: 0.8, vendor: "cisco", version: "ons 15531/15532 t31", }, { model: "enterprise firewall", scope: "eq", trust: 0.8, vendor: "symantec", version: "7.0", }, { model: "interstage application server", scope: "eq", trust: 0.8, vendor: "fujitsu", version: "5.0/5.1/6.0", }, { model: "gateway security 400 series", scope: null, trust: 0.8, vendor: "symantec", version: null, }, { model: "content router", scope: "eq", trust: 0.8, vendor: "cisco", version: "cr-4430-b", }, { model: "mgx 8250 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "gateway security 5300 series", scope: "eq", trust: 0.8, vendor: "symantec", version: "v1.0", }, { model: "fasthub 400 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "ons 15800 series dwdm platforms", scope: "eq", trust: 0.8, vendor: "cisco", version: "ons 15800/15801/15808", }, { model: "provider-1", scope: "eq", trust: 0.8, vendor: "check point", version: "ng with application intelligence (r55)", }, { model: "hp ethertwist switch", scope: null, trust: 0.8, vendor: "hewlett packard", version: null, }, { model: "8110 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "ciscoworks for windows", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "microswitch", scope: "eq", trust: 0.8, vendor: "cisco", version: "1538/1548", }, { model: "ws-x6608-e1", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "ons 15830", scope: "eq", trust: 0.8, vendor: "cisco", version: "t30 optical amplification system", }, { model: "windows xp", scope: "eq", trust: 0.8, vendor: "microsoft", version: "sp3", }, { model: "windows server 2003", scope: null, trust: 0.8, vendor: "microsoft", version: null, }, { model: "provider-1", scope: "eq", trust: 0.8, vendor: "check point", version: "ng fp3", }, { model: "switchprobe", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "ix3000 series", scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: "gateway security 5400 series", scope: "eq", trust: 0.8, vendor: "symantec", version: "v2.x", }, { model: "catalyst 2800 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "interstage security director", scope: "eq", trust: 0.8, vendor: "fujitsu", version: "v5.0l10/v5.0l20/v6.0l10", }, { model: "bpx 8600 series", scope: "eq", trust: 0.8, vendor: "cisco", version: "broadb network termination unit", }, { model: "vpn-1/firewall-1", scope: "eq", trust: 0.8, vendor: "check point", version: "ng with application intelligence (r55)", }, { model: "rt series", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "hp procurve routing switch", scope: "eq", trust: 0.8, vendor: "hewlett packard", version: "9300m series", }, { model: "ip/tv", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "safegate", scope: "eq", trust: 0.8, vendor: "fujitsu", version: "2.2.1", }, { model: "me1100 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "ix5000 series", scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: "gs4000", scope: null, trust: 0.8, vendor: "hitachi", version: null, }, { model: "ciscoworks host solution engine", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "catalyst 3000 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vpn-1/firewall-1", scope: "eq", trust: 0.8, vendor: "check point", version: "ng fp3", }, { model: "catalyst 3900 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "ws-x6608-t1", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "gr4000", scope: null, trust: 0.8, vendor: "hitachi", version: null, }, { model: "provider-1", scope: "eq", trust: 0.8, vendor: "check point", version: "ng with application intelligence (r54)", }, { model: "ata 180 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "cx3200", scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: "mgx 8950 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "secure ids", scope: "eq", trust: 0.8, vendor: "cisco", version: "(netranger) ids module", }, { model: "ons 15400 series", scope: "eq", trust: 0.8, vendor: "cisco", version: "ons 15454", }, { model: "ons 15300 series", scope: "eq", trust: 0.8, vendor: "cisco", version: "ons 15327", }, { model: "ciscoworks wireless lan solution engine", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "fasthub 300 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "11.0", }, { model: "secure user registration tool", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "seil/neu", scope: "eq", trust: 0.8, vendor: "internet initiative", version: "2fe", }, { model: "content switching module", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "gr2000", scope: null, trust: 0.8, vendor: "hitachi", version: null, }, { model: "qx series", scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: "seil/neu", scope: "lt", trust: 0.8, vendor: "internet initiative", version: "2fe plus ver.1.10 earlier firmware", }, { model: "localdirector", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vpn-1/firewall-1", scope: "eq", trust: 0.8, vendor: "check point", version: "ng with application intelligence (r54)", }, { model: "windows 9x", scope: "eq", trust: 0.8, vendor: "microsoft", version: "98", }, { model: "ons 15831", scope: "eq", trust: 0.8, vendor: "cisco", version: "t31 dwdm system", }, { model: "microhub", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "windows 9x", scope: "eq", trust: 0.8, vendor: "microsoft", version: "me", }, { model: "sn 5400 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "router", scope: "eq", trust: 0.8, vendor: "allied telesis", version: "( includes products other than routers tcp all products that implement )", }, { model: "seil/neu", scope: "eq", trust: 0.8, vendor: "internet initiative", version: "128", }, { model: "windows 2000", scope: null, trust: 0.8, vendor: "microsoft", version: null, }, { model: "safegate", scope: "eq", trust: 0.8, vendor: "fujitsu", version: "v2.0l20a", }, { model: "interstage security director", scope: "eq", trust: 0.8, vendor: "fujitsu", version: "v3.0l20/v4.0l10/v4.0l20", }, { model: "catalyst 1900 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "ciscoworks device fault manager", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "mgx 8220 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "igx 8400 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "content engine", scope: "eq", trust: 0.8, vendor: "cisco", version: "590 7320", }, { model: "aironet 350 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "seil/neu", scope: "lt", trust: 0.8, vendor: "internet initiative", version: "t1 ver.2.22 earlier ver.2.x firmware", }, { model: "ons 15100 series", scope: "eq", trust: 0.8, vendor: "cisco", version: "ons 15190/15194", }, { model: "internet cdn solution", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "univerge ip8800/s,/r series", scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: "systems escon channel port adapter", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "firewall/vpn appliance", scope: "eq", trust: 0.8, vendor: "symantec", version: "100/200/200r", }, { model: "hp advancestack switch", scope: null, trust: 0.8, vendor: "hewlett packard", version: null, }, { model: "catalyst 4000 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "catalyst 2820 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "firewall services module", scope: "eq", trust: 0.8, vendor: "cisco", version: "(catalyst 6500", }, { model: "aironet ap340 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "css 11000 series", scope: "eq", trust: 0.8, vendor: "cisco", version: "css 11150", }, { model: "ix5500 series", scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: "gs3000", scope: null, trust: 0.8, vendor: "hitachi", version: null, }, { model: "nexland pro series firewall appliance", scope: null, trust: 0.8, vendor: "symantec", version: null, }, { model: "velociraptor", scope: "eq", trust: 0.8, vendor: "symantec", version: "1.5 model 1100/1200/1300", }, { model: "interstage security director", scope: "eq", trust: 0.8, vendor: "fujitsu", version: "4.0/4.1", }, { model: "application and content networking system", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "secure access control server software", scope: "eq", trust: 0.8, vendor: "cisco", version: "for windows unix", }, { model: "vg248", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "enterprise firewall", scope: "eq", trust: 0.8, vendor: "symantec", version: "8.0", }, { model: "catalyst 1200 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "global site selector", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "mds 9000 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "ix2000 series", scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: "catalyst 5000 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "info center", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "css 11000 series", scope: "eq", trust: 0.8, vendor: "cisco", version: "(arrowpoint)", }, { model: "enterprise firewall", scope: "eq", trust: 0.8, vendor: "symantec", version: "7.0.4", }, { model: "content distribution manager", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "catalyst 6000 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "content delivery manager", scope: "eq", trust: 0.8, vendor: "cisco", version: "4630 4650", }, { model: "css 11500 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "seil/neu", scope: "lt", trust: 0.8, vendor: "internet initiative", version: "atm ver.1.36 earlier firmware", }, { model: "css 11000 series", scope: "eq", trust: 0.8, vendor: "cisco", version: "css 11050", }, { model: "ix1000 series", scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: "cache engine", scope: "eq", trust: 0.8, vendor: "cisco", version: "505 570", }, { model: "ons 15832", scope: "eq", trust: 0.8, vendor: "cisco", version: "t31 dwdm system", }, { model: "windows 9x", scope: "eq", trust: 0.8, vendor: "microsoft", version: "98 scd", }, { model: "intelligent contact management", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "unity", scope: "eq", trust: 0.8, vendor: "cisco", version: "server", }, { model: "vpn 3000 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "css 11000 series", scope: "eq", trust: 0.8, vendor: "cisco", version: "css 11800", }, { model: "mgx 8850 series", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "hp procurve switch", scope: null, trust: 0.8, vendor: "hewlett packard", version: null, }, { model: "interstage security director", scope: "eq", trust: 0.8, vendor: "fujitsu", version: "v6.0l10", }, { model: "tru64 f pk8", scope: "eq", trust: 0.6, vendor: "hp", version: "4.0", }, { model: "catalyst", scope: "eq", trust: 0.6, vendor: "cisco", version: "50005.1", }, { model: "catalyst", scope: "eq", trust: 0.6, vendor: "cisco", version: "50004.5", }, { model: "catalyst", scope: "eq", trust: 0.6, vendor: "cisco", version: "40005.5", }, { model: "catalyst", scope: "eq", trust: 0.6, vendor: "cisco", version: "40005.2", }, { model: "call manager", scope: "eq", trust: 0.6, vendor: "cisco", version: "3.1", }, { model: "vpn concentrator", scope: "ne", trust: 0.6, vendor: "cisco", version: "30003.1", }, { model: "vpn concentrator", scope: "ne", trust: 0.6, vendor: "cisco", version: "30003.0.3", }, { model: "css11500 content services switch s", scope: "ne", trust: 0.6, vendor: "cisco", version: "7.30", }, { model: "css11500 content services switch s", scope: "ne", trust: 0.6, vendor: "cisco", version: "7.20", }, { model: "velociraptor", scope: "eq", trust: 0.3, vendor: "symantec", version: "13001.5", }, { model: "velociraptor", scope: "eq", trust: 0.3, vendor: "symantec", version: "12001.5", }, { model: "velociraptor", scope: "eq", trust: 0.3, vendor: "symantec", version: "11001.5", }, { model: "nexland pro800turbo firewall appliance", scope: null, trust: 0.3, vendor: "symantec", version: null, }, { model: "nexland pro800 firewall appliance", scope: null, trust: 0.3, vendor: "symantec", version: null, }, { model: "nexland pro400 firewall appliance", scope: null, trust: 0.3, vendor: "symantec", version: null, }, { model: "nexland pro100 firewall appliance", scope: null, trust: 0.3, vendor: "symantec", version: null, }, { model: "gateway security", scope: "eq", trust: 0.3, vendor: "symantec", version: "54002.0.1", }, { model: "gateway security", scope: "eq", trust: 0.3, vendor: "symantec", version: "54002.0", }, { model: "gateway security", scope: "eq", trust: 0.3, vendor: "symantec", version: "53101.0", }, { model: "gateway security", scope: "eq", trust: 0.3, vendor: "symantec", version: "53001.0", }, { model: "gateway security 460r", scope: null, trust: 0.3, vendor: "symantec", version: null, }, { model: "gateway security", scope: "eq", trust: 0.3, vendor: "symantec", version: "460", }, { model: "gateway security", scope: "eq", trust: 0.3, vendor: "symantec", version: "440", }, { model: "gateway security", scope: "eq", trust: 0.3, vendor: "symantec", version: "4200", }, { model: "gateway security 360r build", scope: "eq", trust: 0.3, vendor: "symantec", version: "2.1415", }, { model: "gateway security 360r build", scope: "eq", trust: 0.3, vendor: "symantec", version: "2.1300", }, { model: "gateway security 360r", scope: null, trust: 0.3, vendor: "symantec", version: null, }, { model: "gateway security", scope: "eq", trust: 0.3, vendor: "symantec", version: "360", }, { model: "gateway security", scope: "eq", trust: 0.3, vendor: "symantec", version: "320", }, { model: "firewall/vpn appliance 200r", scope: null, trust: 0.3, vendor: "symantec", version: null, }, { model: "firewall/vpn appliance", scope: "eq", trust: 0.3, vendor: "symantec", version: "200", }, { model: "firewall/vpn appliance", scope: "eq", trust: 0.3, vendor: "symantec", version: "100", }, { model: "enterprise firewall solaris", scope: "eq", trust: 0.3, vendor: "symantec", version: "8.0", }, { model: "enterprise firewall nt/2000", scope: "eq", trust: 0.3, vendor: "symantec", version: "8.0", }, { model: "enterprise firewall solaris", scope: "eq", trust: 0.3, vendor: "symantec", version: "7.0.4", }, { model: "enterprise firewall nt/2000", scope: "eq", trust: 0.3, vendor: "symantec", version: "7.0.4", }, { model: "enterprise firewall solaris", scope: "eq", trust: 0.3, vendor: "symantec", version: "7.0", }, { model: "enterprise firewall nt/2000", scope: "eq", trust: 0.3, vendor: "symantec", version: "7.0", }, { model: "irix", scope: "eq", trust: 0.3, vendor: "sgi", version: "6.5.25", }, { model: "irix", scope: "eq", trust: 0.3, vendor: "sgi", version: "6.5.24", }, { model: "irix", scope: "eq", trust: 0.3, vendor: "sgi", version: "6.5.23", }, { model: "irix", scope: "eq", trust: 0.3, vendor: "sgi", version: "6.5.22", }, { model: "turbo", scope: "eq", trust: 0.3, vendor: "seil", version: "1.18", }, { model: "neu t1", scope: "eq", trust: 0.3, vendor: "seil", version: "2.21", }, { model: "neu t1", scope: "eq", trust: 0.3, vendor: "seil", version: "1.89", }, { model: "neu atm", scope: "eq", trust: 0.3, vendor: "seil", version: "1.35", }, { model: "neu 2fe plus", scope: "eq", trust: 0.3, vendor: "seil", version: "1.9", }, { model: "neu 2fe", scope: "eq", trust: 0.3, vendor: "seil", version: "2.21", }, { model: "neu 2fe", scope: "eq", trust: 0.3, vendor: "seil", version: "1.89", }, { model: "neu", scope: "eq", trust: 0.3, vendor: "seil", version: "1282.21", }, { model: "neu", scope: "eq", trust: 0.3, vendor: "seil", version: "1281.89", }, { model: "unixware", scope: "eq", trust: 0.3, vendor: "sco", version: "7.1.3", }, { model: "unixware", scope: "eq", trust: 0.3, vendor: "sco", version: "7.1.1", }, { model: "open server", scope: "eq", trust: 0.3, vendor: "sco", version: "5.0.7", }, { model: "open server", scope: "eq", trust: 0.3, vendor: "sco", version: "5.0.6", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "5.0", }, { model: "screenos r4", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.3", }, { model: "screenos r3", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.3", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.3", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.3", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.3", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.2", }, { model: "screenos r9", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.1", }, { model: "screenos r8", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.1", }, { model: "screenos r7", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.1", }, { model: "screenos r6", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.1", }, { model: "screenos r5", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.1", }, { model: "screenos r4", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.1", }, { model: "screenos r3", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.1", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.1", }, { model: "screenos r10", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.1", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.1", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0.1", }, { model: "screenos r9", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r8", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r7", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r6", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r5", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r4", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r3", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r12", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r11", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r10", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos -dial", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "4.0", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1.1", }, { model: "screenos r9", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r8", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r7", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r6", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r5", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r4", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r3", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r12", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r11", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r10", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.1", }, { model: "screenos r8", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.3", }, { model: "screenos r7", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.3", }, { model: "screenos r6", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.3", }, { model: "screenos r5", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.3", }, { model: "screenos r4", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.3", }, { model: "screenos r3", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.3", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.3", }, { model: "screenos r1.1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.3", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.3", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.3", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.2", }, { model: "screenos r7", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.1", }, { model: "screenos r6", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.1", }, { model: "screenos r5", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.1", }, { model: "screenos r4", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.1", }, { model: "screenos r3", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.1", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.1", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.1", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0.1", }, { model: "screenos r4", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0", }, { model: "screenos r3", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "3.0", }, { model: "screenos r4", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.10", }, { model: "screenos r3", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.10", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.8", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.8", }, { model: "screenos r3", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.7.1", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.7.1", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.7.1", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.7.1", }, { model: "screenos r9", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos r8", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos r7", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos r6", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos r5", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos r4", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos r3", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos r12", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos r11", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos r10", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6.1", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.6", }, { model: "screenos r6", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.5", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.5", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.5", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.5", }, { model: "screenos r7", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.1", }, { model: "screenos r6", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.1", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.1", }, { model: "screenos r8", scope: "eq", trust: 0.3, vendor: "netscreen", version: "2.0.1", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "1.73", }, { model: "screenos r1", scope: "eq", trust: 0.3, vendor: "netscreen", version: "1.73", }, { model: "screenos r2", scope: "eq", trust: 0.3, vendor: "netscreen", version: "1.66", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "1.66", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "1.64", }, { model: "screenos", scope: "eq", trust: 0.3, vendor: "netscreen", version: "1.7", }, { model: "beta", scope: "eq", trust: 0.3, vendor: "netbsd", version: "1.6", }, { model: "windows xp tablet pc edition sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp tablet pc edition sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp tablet pc edition", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp professional edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "x64", }, { model: "windows xp professional sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp professional sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp professional", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp media center edition sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp media center edition sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp media center edition", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp home sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp home sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp home", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp embedded sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp embedded", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows xp 64-bit edition version", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows xp", scope: "eq", trust: 0.3, vendor: "microsoft", version: "0", }, { model: "windows server web edition sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows server web edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows server standard edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003x64", }, { model: "windows server standard edition sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows server standard edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows server enterprise edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003x64", }, { model: "windows server enterprise edition itanium sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows server enterprise edition itanium", scope: "eq", trust: 0.3, vendor: "microsoft", version: "20030", }, { model: "windows server enterprise edition sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows server enterprise edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows server datacenter edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003x64", }, { model: "windows server datacenter edition itanium sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows server datacenter edition itanium", scope: "eq", trust: 0.3, vendor: "microsoft", version: "20030", }, { model: "windows server datacenter edition sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows server datacenter edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows server sp4", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows server sp3", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows server sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows server sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows server", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows professional sp4", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows professional sp3", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows professional sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows professional sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows professional", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows datacenter server sp4", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows datacenter server sp3", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows datacenter server sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows datacenter server sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows datacenter server", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows advanced server sp4", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows advanced server sp3", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows advanced server sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows advanced server sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows advanced server", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "data loss prevention", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.2.2", }, { model: "data loss prevention", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.2.1", }, { model: "data loss prevention", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.2.0", }, { model: "data loss prevention", scope: "eq", trust: 0.3, vendor: "mcafee", version: "8.6", }, { model: "t-series router t640", scope: null, trust: 0.3, vendor: "juniper", version: null, }, { model: "t-series router t320", scope: null, trust: 0.3, vendor: "juniper", version: null, }, { model: "m-series router m5", scope: null, trust: 0.3, vendor: "juniper", version: null, }, { model: "m-series router m40e", scope: null, trust: 0.3, vendor: "juniper", version: null, }, { model: "m-series router m40", scope: null, trust: 0.3, vendor: "juniper", version: null, }, { model: "m-series router m20", scope: null, trust: 0.3, vendor: "juniper", version: null, }, { model: "m-series router m160", scope: null, trust: 0.3, vendor: "juniper", version: null, }, { model: "m-series router m10", scope: null, trust: 0.3, vendor: "juniper", version: null, }, { model: "e-series router", scope: null, trust: 0.3, vendor: "juniper", version: null, }, { model: "nichestack", scope: "eq", trust: 0.3, vendor: "interniche", version: "2.0", }, { model: "nichelite", scope: "eq", trust: 0.3, vendor: "interniche", version: "2.0", }, { model: "rfc tcp", scope: "eq", trust: 0.3, vendor: "ietf", version: "793:", }, { model: "rfc tcp extensions for high performance", scope: "eq", trust: 0.3, vendor: "ietf", version: "1323:", }, { model: "aix l", scope: "eq", trust: 0.3, vendor: "ibm", version: "5.3", }, { model: "aix l", scope: "eq", trust: 0.3, vendor: "ibm", version: "5.2", }, { model: "aix l", scope: "eq", trust: 0.3, vendor: "ibm", version: "5.1", }, { model: "tru64 b-2 pk4", scope: "eq", trust: 0.3, vendor: "hp", version: "5.1", }, { model: "tru64 b pk4", scope: "eq", trust: 0.3, vendor: "hp", version: "5.1", }, { model: "tru64 b pk3", scope: "eq", trust: 0.3, vendor: "hp", version: "5.1", }, { model: "tru64 a pk6", scope: "eq", trust: 0.3, vendor: "hp", version: "5.1", }, { model: "tru64 g pk4", scope: "eq", trust: 0.3, vendor: "hp", version: "4.0", }, { model: "procurve switch 9315m", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 9308m", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 9304m", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 8000m", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 5372xl j4848a", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 5348xl j4849a", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 5308xl j4819a", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 5304xl j4850a", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 4108gl-bundle", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 4108gl j4865a", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 4108gl", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 4000m j4121a", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 4000m", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch", scope: "eq", trust: 0.3, vendor: "hp", version: "2525", }, { model: "procurve switch j4813a", scope: "eq", trust: 0.3, vendor: "hp", version: "2524", }, { model: "procurve switch", scope: "eq", trust: 0.3, vendor: "hp", version: "2524", }, { model: "procurve switch", scope: "eq", trust: 0.3, vendor: "hp", version: "2512", }, { model: "procurve switch 2424m j4093a", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 2424m", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 2400m j4122a", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 2400m", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "procurve switch 1600m", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "ethertwist", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "advancestack switch 800t j3245a", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "advancestack 10base-t switching hub j3210a a.03.07", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "advancestack 10base-t switching hub j3205a a.03.07", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "advancestack 10base-t switching hub j3204a a.03.07", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "advancestack 10base-t switching hub j3203a a.03.07", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "advancestack 10base-t switching hub j3202a a.03.07", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "advancestack 10base-t switching hub j3201a a.03.07", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "advancestack 10base-t switching hub j3200a a.03.07", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "9.3-release-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.3-rc3-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.3-rc2-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.3-rc2", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.3-rc1-p2", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.3-rc", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.3-prerelease", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.3-beta3-p2", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.3-beta1-p2", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.3-beta1-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.3-beta1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "9.3", }, { model: "9.2-stable", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-releng", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-release-p9", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-release-p8", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-release-p7", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-release-p5", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-release-p4", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-release-p3", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-release-p11", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-release-p10", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-rc3-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-rc2-p2", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-rc2", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-rc1-p2", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-rc1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "rc2", scope: "eq", trust: 0.3, vendor: "freebsd", version: "9.2", }, { model: "rc1", scope: "eq", trust: 0.3, vendor: "freebsd", version: "9.2", }, { model: "prerelease", scope: "eq", trust: 0.3, vendor: "freebsd", version: "9.2", }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "9.2-", }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "9.2", }, { model: "9.1-stable", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-releng", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p7", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p3", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p18", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p17", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p16", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p15", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p14", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p12", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p11", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p10", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-rc2", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-rc1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1--releng", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "release-p5", scope: "eq", trust: 0.3, vendor: "freebsd", version: "9.1", }, { model: "release-p4", scope: "eq", trust: 0.3, vendor: "freebsd", version: "9.1", }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "9.1", }, { model: "9.0-stable", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.0-releng", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.0-release-p6", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.0-release", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.0-rc3", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.0-rc1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.0--releng", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "9.0", }, { model: "8.4-releng", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-release-p9", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-release-p8", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-release-p7", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-release-p4", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-release-p15", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-release-p14", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-release-p13", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-release-p12", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-release-p11", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-rc2-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-rc1-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-prerelease", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-beta1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "8.4", }, { model: "8.3-stable", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.3-releng", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.3-release-p8", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.3-release-p6", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.3-release-p16", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.3-release-p15", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.3-release-p14", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.3-release-p11", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "8.3", }, { model: "8.2-stable", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.2-release-p2", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.2-release-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.2-release", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "release -p3", scope: "eq", trust: 0.3, vendor: "freebsd", version: "8.2-", }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "8.2", }, { model: "8.1-stable", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.1-releng", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.1-release-p5", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.1-release-p4", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.1-release-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.1-release", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.1-prerelease", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "8.1", }, { model: "8.0-stable", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.0-release", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.0-rc1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "-release-p5", scope: "eq", trust: 0.3, vendor: "freebsd", version: "8.0", }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "8.0", }, { model: "8-stable", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "8-releng", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-release-p8", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-release-p7", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-release-p6", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-release-p5", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-release-p4", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-release-p2", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-release-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-rc3-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-rc2-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-rc1-p1", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-beta", scope: null, trust: 0.3, vendor: "freebsd", version: null, }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "10.0", }, { model: "freebsd", scope: "eq", trust: 0.3, vendor: "freebsd", version: "10", }, { model: "unicos/mp", scope: "eq", trust: 0.3, vendor: "cray", version: "2.3", }, { model: "unicos/mp", scope: null, trust: 0.3, vendor: "cray", version: null, }, { model: "unicos/mk", scope: "eq", trust: 0.3, vendor: "cray", version: "2.0.5.54", }, { model: "unicos/mk", scope: "eq", trust: 0.3, vendor: "cray", version: "1.5.1", }, { model: "unicos/mk", scope: "eq", trust: 0.3, vendor: "cray", version: "1.5", }, { model: "unicos max", scope: "eq", trust: 0.3, vendor: "cray", version: "1.3.5", }, { model: "unicos max", scope: "eq", trust: 0.3, vendor: "cray", version: "1.3", }, { model: "unicos", scope: "eq", trust: 0.3, vendor: "cray", version: "9.2.4", }, { model: "unicos", scope: "eq", trust: 0.3, vendor: "cray", version: "9.2", }, { model: "unicos", scope: "eq", trust: 0.3, vendor: "cray", version: "9.0.2.5", }, { model: "unicos", scope: "eq", trust: 0.3, vendor: "cray", version: "9.0", }, { model: "unicos", scope: "eq", trust: 0.3, vendor: "cray", version: "8.3", }, { model: "unicos", scope: "eq", trust: 0.3, vendor: "cray", version: "8.0", }, { model: "unicos", scope: "eq", trust: 0.3, vendor: "cray", version: "7.0", }, { model: "unicos", scope: "eq", trust: 0.3, vendor: "cray", version: "6.1", }, { model: "unicos e", scope: "eq", trust: 0.3, vendor: "cray", version: "6.0", }, { model: "unicos", scope: "eq", trust: 0.3, vendor: "cray", version: "6.0", }, { model: "ws-x6624", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ws-x6608", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "wireless lan solution engine", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "wireless lan solution appliance", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "wgb340", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "vpn concentrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "5008", }, { model: "vpn concentrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "5002", }, { model: "vpn concentrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "5001", }, { model: "voice manager", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "user registration tool vlan policy server", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "unity server", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.0", }, { model: "unity server", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.3", }, { model: "unity server", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.2", }, { model: "unity server", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.1", }, { model: "unity server", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.0", }, { model: "unity server", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.46", }, { model: "unity server", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.4", }, { model: "unity server", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.3", }, { model: "unity server", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.2", }, { model: "unity server", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.1", }, { model: "unity server", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.0", }, { model: "unity server", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "switchprobe", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.1", }, { model: "switchprobe", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.7", }, { model: "switchprobe", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.6", }, { model: "switchprobe", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.5", }, { model: "switchprobe", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2", }, { model: "switchprobe", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.1", }, { model: "switchprobe", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.1", }, { model: "sn5400 series storage routers", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "sn storage router sn5428-3.3.2-k9", scope: "eq", trust: 0.3, vendor: "cisco", version: "5428", }, { model: "sn storage router sn5428-3.3.1-k9", scope: "eq", trust: 0.3, vendor: "cisco", version: "5428", }, { model: "sn storage router sn5428-3.2.2-k9", scope: "eq", trust: 0.3, vendor: "cisco", version: "5428", }, { model: "sn storage router sn5428-3.2.1-k9", scope: "eq", trust: 0.3, vendor: "cisco", version: "5428", }, { model: "sn storage router sn5428-2.5.1-k9", scope: "eq", trust: 0.3, vendor: "cisco", version: "5428", }, { model: "sn storage router sn5428-2-3.3.2-k9", scope: "eq", trust: 0.3, vendor: "cisco", version: "5428", }, { model: "sn storage router sn5428-2-3.3.1-k9", scope: "eq", trust: 0.3, vendor: "cisco", version: "5428", }, { model: "sn storage router", scope: "eq", trust: 0.3, vendor: "cisco", version: "54201.1.3", }, { model: "sn storage router", scope: "eq", trust: 0.3, vendor: "cisco", version: "54201.1(7)", }, { model: "sn storage router", scope: "eq", trust: 0.3, vendor: "cisco", version: "54201.1(5)", }, { model: "sn storage router", scope: "eq", trust: 0.3, vendor: "cisco", version: "54201.1(4)", }, { model: "sn storage router", scope: "eq", trust: 0.3, vendor: "cisco", version: "54201.1(3)", }, { model: "sn storage router", scope: "eq", trust: 0.3, vendor: "cisco", version: "54201.1(2)", }, { model: "secure pix firewall", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "secure intrusion detection system", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3.1", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3(3.109)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3(3.102)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.3(1)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.2.3", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.2.2.111", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.2.2", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.2.1", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.2(3.100)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.2(3)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.2(2)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.2(1)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1.5", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1.4", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1.3", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1(5)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1(4)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1(3)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1(2)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.1(1)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.0.4", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.0.3", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.0(4.101)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.0(4)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.0(2)", }, { model: "pix firewall", scope: "eq", trust: 0.3, vendor: "cisco", version: "6.0(1)", }, { model: "parallel channel port adapter", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ons t31 submarine wdm system", scope: "eq", trust: 0.3, vendor: "cisco", version: "15863", }, { model: "ons t31 dwdm system", scope: "eq", trust: 0.3, vendor: "cisco", version: "15832", }, { model: "ons t31 dwdm system", scope: "eq", trust: 0.3, vendor: "cisco", version: "15831", }, { model: "ons t30 optical amplification system", scope: "eq", trust: 0.3, vendor: "cisco", version: "15830", }, { model: "ons dense wave division mux platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "15808", }, { model: "ons dense wave division mux platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "15801", }, { model: "ons dense wave division mux platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "15800", }, { model: "ons t31 omds metro wdm system", scope: "eq", trust: 0.3, vendor: "cisco", version: "15532", }, { model: "ons t31 omds metro wdm system", scope: "eq", trust: 0.3, vendor: "cisco", version: "15531", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154544.1(3)", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154544.1(2)", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154544.1(1)", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154544.1(0)", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154544.1", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154544.0(2)", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154544.0(1)", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154544.0", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154543.4", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154543.3", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154543.2.0", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154543.1.0", }, { model: "ons optical transport platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "154543.0", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153274.1(3)", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153274.1(2)", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153274.1(1)", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153274.1(0)", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153274.0(2)", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153274.0(1)", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153274.0", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153273.4", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153273.3", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153273.2", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153273.1", }, { model: "ons", scope: "eq", trust: 0.3, vendor: "cisco", version: "153273.0", }, { model: "ons ip transport concentrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "15194", }, { model: "ons ip transport concentrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "15190", }, { model: "microswitch", scope: "eq", trust: 0.3, vendor: "cisco", version: "1548", }, { model: "microswitch", scope: "eq", trust: 0.3, vendor: "cisco", version: "1538", }, { model: "microhub", scope: "eq", trust: 0.3, vendor: "cisco", version: "1500", }, { model: "mgx-8850 r2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "mgx-8850 r1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "mgx-8260", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "mgx-8240", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "mgx-8220", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "mgx pxm1", scope: "eq", trust: 0.3, vendor: "cisco", version: "8850-1.2.11", }, { model: "mgx pxm1", scope: "eq", trust: 0.3, vendor: "cisco", version: "8850-1.2.10", }, { model: "mgx", scope: "eq", trust: 0.3, vendor: "cisco", version: "8850", }, { model: "mgx", scope: "eq", trust: 0.3, vendor: "cisco", version: "8830", }, { model: "mgx", scope: "eq", trust: 0.3, vendor: "cisco", version: "82501.2.11", }, { model: "mgx", scope: "eq", trust: 0.3, vendor: "cisco", version: "82501.2.10", }, { model: "mgx", scope: "eq", trust: 0.3, vendor: "cisco", version: "82301.2.11", }, { model: "mgx", scope: "eq", trust: 0.3, vendor: "cisco", version: "82301.2.10", }, { model: "mgx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "me1100", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "mds", scope: "eq", trust: 0.3, vendor: "cisco", version: "90002.0(0.86)", }, { model: "mds", scope: "eq", trust: 0.3, vendor: "cisco", version: "90001.3(3.33)", }, { model: "mds", scope: "eq", trust: 0.3, vendor: "cisco", version: "9000", }, { model: "local director", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "lightstream atm switches", scope: "eq", trust: 0.3, vendor: "cisco", version: "100", }, { model: "ip/tv server", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ip phone", scope: "eq", trust: 0.3, vendor: "cisco", version: "7960", }, { model: "ip phone", scope: "eq", trust: 0.3, vendor: "cisco", version: "7940", }, { model: "ip phone", scope: "eq", trust: 0.3, vendor: "cisco", version: "7905", }, { model: "ios 12.3xq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3bw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3b", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ze", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2za", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yv", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ys", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yo", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ym", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ye", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ya", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xs", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sxb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sxa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2se", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2s", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2mc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ja", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ew", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2dx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2dd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2cx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2bz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2by", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2bx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2bw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2bc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2b", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1yj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1yi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1yh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1yf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ye", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1yd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1yc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1yb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ya", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1xv", }, { model: "ios 12.1xu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ey", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ex", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ew", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ev", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1eu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1eo", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ec", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1eb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ea", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1e", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1db", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1da", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ay", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ax", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1aa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 e2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0xv", }, { model: "ios 12.0xu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xs", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0wx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0wt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0wc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0w5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0sz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0sx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0st", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0sl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0s", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0dc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0db", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0da", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 11.2sa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 11.2p", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 11.1cc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 11.1aa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "internet cdn content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "7320", }, { model: "internet cdn content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "590", }, { model: "intelligent contact manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0", }, { model: "intelligent contact manager", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "infocenter", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "igx", scope: "eq", trust: 0.3, vendor: "cisco", version: "8400", }, { model: "hosting solution engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "1.3", }, { model: "hosting solution engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "1.0", }, { model: "gss global site selector", scope: "eq", trust: 0.3, vendor: "cisco", version: "44900", }, { model: "gss global site selector", scope: "eq", trust: 0.3, vendor: "cisco", version: "4480", }, { model: "fasthub", scope: "eq", trust: 0.3, vendor: "cisco", version: "4001.0", }, { model: "fasthub", scope: "eq", trust: 0.3, vendor: "cisco", version: "300", }, { model: "escon channel port adapter", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "device fault manager", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "css11800 content services switch", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "css11500 content services switch", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "css11150 content services switch", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "css11050 content services switch", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "css11000 content services switch", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "csm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "cr-4430-b", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "content router", scope: "eq", trust: 0.3, vendor: "cisco", version: "44304.1", }, { model: "content router", scope: "eq", trust: 0.3, vendor: "cisco", version: "44304.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "73204.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "73204.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "73203.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "73202.2.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "7320", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5904.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5904.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5903.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5902.2.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "590", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5604.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5604.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5603.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5602.2.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5074.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5074.0", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5073.1", }, { model: "content engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5072.2.0", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "4670", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "46504.1", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "46504.0", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "4650", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "46304.1", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "46304.0", }, { model: "content distribution manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "4630", }, { model: "content delivery manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "4650", }, { model: "content delivery manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "4630", }, { model: "ciscoworks windows", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "ciscosecure acs for windows and unix", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "ciscosecure acs appliance", scope: "eq", trust: 0.3, vendor: "cisco", version: "1111", }, { model: "catalyst series ssl services module", scope: "eq", trust: 0.3, vendor: "cisco", version: "6500", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60007.6(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60007.5(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60007.1(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60007.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.3(4)", }, { model: "catalyst pan", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.3", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.2(0.111)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.2(0.110)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.1(2.13)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60006.1(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.5(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.5(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.5(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.5(13)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.5(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.4", }, { model: "catalyst ws-x6380-nam", scope: "eq", trust: 0.3, vendor: "cisco", version: "60003.1", }, { model: "catalyst ws-svc-nam-2", scope: "eq", trust: 0.3, vendor: "cisco", version: "60003.1", }, { model: "catalyst ws-svc-nam-1", scope: "eq", trust: 0.3, vendor: "cisco", version: "60003.1", }, { model: "catalyst ws-svc-nam-2", scope: "eq", trust: 0.3, vendor: "cisco", version: "60002.2", }, { model: "catalyst ws-svc-nam-1", scope: "eq", trust: 0.3, vendor: "cisco", version: "60002.2", }, { model: "catalyst ws-x6380-nam", scope: "eq", trust: 0.3, vendor: "cisco", version: "60002.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50006.3(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50006.1(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50006.1(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50006.1(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(7)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(6)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(13)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.5(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.4.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.4(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.4(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.4(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.4(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.2(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.2(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.2(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.2(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.2", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50005.1(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(9)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(8)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(7)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(6)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(5)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(12)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(11)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "50004.5(10)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "5000", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40007.6(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40007.5(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40007.1.2", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40007.1(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40007.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40006.3.5", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40006.3(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40006.1(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5.5", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5(13)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.5(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.4.1", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.4(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.4(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.4(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.4", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(7)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(6)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(5)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.2(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40005.1(1)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(9)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(8)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(7)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(6)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(5)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(4)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "40004.5(10)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "4000", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "3900", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "3000", }, { model: "catalyst supervisor software", scope: "eq", trust: 0.3, vendor: "cisco", version: "29xx2.4.401", }, { model: "catalyst supervisor software", scope: "eq", trust: 0.3, vendor: "cisco", version: "29xx2.1.1102", }, { model: "catalyst supervisor software", scope: "eq", trust: 0.3, vendor: "cisco", version: "29xx2.1.6", }, { model: "catalyst supervisor software", scope: "eq", trust: 0.3, vendor: "cisco", version: "29xx2.1.502", }, { model: "catalyst supervisor software", scope: "eq", trust: 0.3, vendor: "cisco", version: "29xx2.1.501", }, { model: "catalyst supervisor software", scope: "eq", trust: 0.3, vendor: "cisco", version: "29xx2.1.5", }, { model: "catalyst supervisor software", scope: "eq", trust: 0.3, vendor: "cisco", version: "29xx1.0", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2950", }, { model: "catalyst 2948g-l3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst 2948g-ge-tx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst 2948g", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2920", }, { model: "catalyst xl", scope: "eq", trust: 0.3, vendor: "cisco", version: "2900", }, { model: "catalyst lre xl", scope: "eq", trust: 0.3, vendor: "cisco", version: "2900", }, { model: "catalyst xu", scope: "eq", trust: 0.3, vendor: "cisco", version: "290012.0", }, { model: "catalyst sa6", scope: "eq", trust: 0.3, vendor: "cisco", version: "290011.2", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29006.1(3)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29006.1(2)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29005.5(7)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29005.5(6)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29004.5(12)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "29004.5(11)", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2900", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2820", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "2800", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "1900", }, { model: "catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "1200", }, { model: "call manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.0", }, { model: "call manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.3(3)", }, { model: "call manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.3", }, { model: "call manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.2", }, { model: "call manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.1(2)", }, { model: "call manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.0", }, { model: "call manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.0", }, { model: "call manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "1.0", }, { model: "cache engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5704.1", }, { model: "cache engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5704.0", }, { model: "cache engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5703.0", }, { model: "cache engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5702.2.0", }, { model: "cache engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "570", }, { model: "cache engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5054.1", }, { model: "cache engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5054.0", }, { model: "cache engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5053.0", }, { model: "cache engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "5052.2.0", }, { model: "cache engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "505", }, { model: "br350", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "br340", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bpx/igx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bpx", scope: "eq", trust: 0.3, vendor: "cisco", version: "8600", }, { model: "bpx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "application & content networking software", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ap350", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ap340", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "wan switch", scope: "eq", trust: 0.3, vendor: "cisco", version: "8950", }, { model: "broadband network termination unit", scope: "eq", trust: 0.3, vendor: "cisco", version: "8110", }, { model: "point software vpn-1 vsx ng with application intelligence", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software vpn-1 next generation fp2", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software vpn-1 next generation fp1", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software vpn-1 next generation fp0", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software vpn-1 sp6", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software vpn-1 sp5a", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software vpn-1 sp5", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software vpn-1 sp4", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software vpn-1 sp3", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software vpn-1 sp2", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software vpn-1 sp1", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software vpn-1", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software vpn-1 fp1", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software secureplatform ng fp2 edition", scope: "eq", trust: 0.3, vendor: "check", version: "2", }, { model: "point software secureplatform ng fp2", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software secureplatform ng fp1", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software secureplatform ng", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software firewall-1 vsx ng with application intelligence", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software firewall-1 next generation fp2", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software firewall-1 next generation fp1", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software firewall-1 next generation fp0", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point software firewall-1 gx", scope: "eq", trust: 0.3, vendor: "check", version: "2.0", }, { model: "point software firewall-1 [ vpn des ]", scope: "eq", trust: 0.3, vendor: "check", version: "+4.1", }, { model: "point software firewall-1 [ vpn des strong ] sp2 build", scope: "eq", trust: 0.3, vendor: "check", version: "++4.141716", }, { model: "point software firewall-1 [ vpn des strong ] build", scope: "eq", trust: 0.3, vendor: "check", version: "++4.141439", }, { model: "point software firewall-1 sp6", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software firewall-1 sp5a", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software firewall-1 sp5", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software firewall-1 sp4", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software firewall-1 sp3", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software firewall-1 sp2", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software firewall-1 sp1", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software firewall-1", scope: "eq", trust: 0.3, vendor: "check", version: "4.1", }, { model: "point software firewall-1 sp8", scope: "eq", trust: 0.3, vendor: "check", version: "4.0", }, { model: "point software firewall-1 sp7", scope: "eq", trust: 0.3, vendor: "check", version: "4.0", }, { model: "point software firewall-1 sp6", scope: "eq", trust: 0.3, vendor: "check", version: "4.0", }, { model: "point software firewall-1 sp5", scope: "eq", trust: 0.3, vendor: "check", version: "4.0", }, { model: "point software firewall-1 sp4", scope: "eq", trust: 0.3, vendor: "check", version: "4.0", }, { model: "point software firewall-1 sp3", scope: "eq", trust: 0.3, vendor: "check", version: "4.0", }, { model: "point software firewall-1 sp2", scope: "eq", trust: 0.3, vendor: "check", version: "4.0", }, { model: "point software firewall-1 sp1", scope: "eq", trust: 0.3, vendor: "check", version: "4.0", }, { model: "point software firewall-1", scope: "eq", trust: 0.3, vendor: "check", version: "4.0", }, { model: "point software firewall-1", scope: "eq", trust: 0.3, vendor: "check", version: "3.0", }, { model: "coat systems security gateway os", scope: "eq", trust: 0.3, vendor: "blue", version: "3.1.2", }, { model: "coat systems security gateway os", scope: "eq", trust: 0.3, vendor: "blue", version: "3.1", }, { model: "coat systems security gateway os", scope: "eq", trust: 0.3, vendor: "blue", version: "3.0", }, { model: "coat systems security gateway os sp1", scope: "eq", trust: 0.3, vendor: "blue", version: "2.1.5001", }, { model: "coat systems security gateway os", scope: "eq", trust: 0.3, vendor: "blue", version: "2.1.10", }, { model: "coat systems security gateway os", scope: "eq", trust: 0.3, vendor: "blue", version: "2.1.9", }, { model: "coat systems security gateway os", scope: "eq", trust: 0.3, vendor: "blue", version: "2.0", }, { model: "coat systems cacheos ca/sa", scope: "eq", trust: 0.3, vendor: "blue", version: "4.1.12", }, { model: "coat systems cacheos ca/sa", scope: "eq", trust: 0.3, vendor: "blue", version: "4.1.10", }, { model: "modular messaging", scope: "eq", trust: 0.3, vendor: "avaya", version: "3.0", }, { model: "intuity audix r5", scope: "eq", trust: 0.3, vendor: "avaya", version: "0", }, { model: "cms r17 r3", scope: null, trust: 0.3, vendor: "avaya", version: null, }, { model: "cms r17", scope: null, trust: 0.3, vendor: "avaya", version: null, }, { model: "cms r16 r6", scope: null, trust: 0.3, vendor: "avaya", version: null, }, { model: "cms r16 r5", scope: null, trust: 0.3, vendor: "avaya", version: null, }, { model: "cms r16", scope: null, trust: 0.3, vendor: "avaya", version: null, }, { model: "alienvault", scope: "eq", trust: 0.3, vendor: "alienvault", version: "5.0.4", }, { model: "alienvault", scope: "eq", trust: 0.3, vendor: "alienvault", version: "5.0", }, { model: "alienvault", scope: "eq", trust: 0.3, vendor: "alienvault", version: "4.15.2", }, { model: "alienvault", scope: "eq", trust: 0.3, vendor: "alienvault", version: "4.15.1", }, { model: "alienvault", scope: "eq", trust: 0.3, vendor: "alienvault", version: "4.15", }, { model: "alienvault", scope: "eq", trust: 0.3, vendor: "alienvault", version: "4.14", }, { model: "alienvault", scope: "eq", trust: 0.3, vendor: "alienvault", version: "4.13", }, { model: "alienvault", scope: "eq", trust: 0.3, vendor: "alienvault", version: "4.12.1", }, { model: "alienvault", scope: "eq", trust: 0.3, vendor: "alienvault", version: "4.12", }, { model: "network data loss prevention", scope: "ne", trust: 0.3, vendor: "mcafee", version: "9.3", }, { model: "9.3-stable", scope: "ne", trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.3-release-p2", scope: "ne", trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.2-release-p12", scope: "ne", trust: 0.3, vendor: "freebsd", version: null, }, { model: "9.1-release-p19", scope: "ne", trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-stable", scope: "ne", trust: 0.3, vendor: "freebsd", version: null, }, { model: "8.4-release-p16", scope: "ne", trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.1-prerelease", scope: "ne", trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.1-beta1-p1", scope: "ne", trust: 0.3, vendor: "freebsd", version: null, }, { model: "10.0-release-p9", scope: "ne", trust: 0.3, vendor: "freebsd", version: null, }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "3080", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "3060", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "3030", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "3015", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30054.0.1", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30054.0", }, { model: "vpn concentrator f", scope: "ne", trust: 0.3, vendor: "cisco", version: "30053.6.7", }, { model: "vpn concentrator d", scope: "ne", trust: 0.3, vendor: "cisco", version: "30053.6.7", }, { model: "vpn concentrator c", scope: "ne", trust: 0.3, vendor: "cisco", version: "30053.6.7", }, { model: "vpn concentrator b", scope: "ne", trust: 0.3, vendor: "cisco", version: "30053.6.7", }, { model: "vpn concentrator a", scope: "ne", trust: 0.3, vendor: "cisco", version: "30053.6.7", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30053.6.7", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30053.6.5", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30053.6.3", }, { model: "vpn hardware client", scope: "ne", trust: 0.3, vendor: "cisco", version: "3002", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30004.0.1", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30004.0.x", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30004.0", }, { model: "vpn concentrator d", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.6.7", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.6.7", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.6.1", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.6", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.5.5", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.5.4", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.5.3", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.5.2", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.5.1", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.5", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.1.4", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.1.2", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.1.1", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.0.4", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30003.0", }, { model: "vpn concentrator", scope: "ne", trust: 0.3, vendor: "cisco", version: "30002.0", }, { model: "pix firewall", scope: "ne", trust: 0.3, vendor: "cisco", version: "6.3.3(133)", }, { model: "pix firewall", scope: "ne", trust: 0.3, vendor: "cisco", version: "6.2.3(110)", }, { model: "pix firewall", scope: "ne", trust: 0.3, vendor: "cisco", version: "6.1.5(104)", }, { model: "ons optical transport platform", scope: "ne", trust: 0.3, vendor: "cisco", version: "154544.14", }, { model: "ons", scope: "ne", trust: 0.3, vendor: "cisco", version: "153274.14", }, { model: "mds", scope: "ne", trust: 0.3, vendor: "cisco", version: "90001.3", }, { model: "local director", scope: "ne", trust: 0.3, vendor: "cisco", version: "4.2(6)", }, { model: "local director", scope: "ne", trust: 0.3, vendor: "cisco", version: "4.2(5)", }, { model: "local director", scope: "ne", trust: 0.3, vendor: "cisco", version: "4.2(4)", }, { model: "local director", scope: "ne", trust: 0.3, vendor: "cisco", version: "4.2(3)", }, { model: "local director", scope: "ne", trust: 0.3, vendor: "cisco", version: "4.2(2)", }, { model: "local director", scope: "ne", trust: 0.3, vendor: "cisco", version: "4.2(1)", }, { model: "ios", scope: "ne", trust: 0.3, vendor: "cisco", version: "12.3(6)", }, { model: "ios 12.2ja", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "ne", trust: 0.3, vendor: "cisco", version: "12.2(23)", }, { model: "ios 12.2 s", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xn1", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "ne", trust: 0.3, vendor: "cisco", version: "12.0(28)", }, { model: "ios 12.0 s", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "fwsm for cisco catalyst series", scope: "ne", trust: 0.3, vendor: "cisco", version: "6500/76001.1(3.17)", }, { model: "fwsm for cisco catalyst series", scope: "ne", trust: 0.3, vendor: "cisco", version: "6500/7600", }, { model: "css11500 content services switch s", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.10", }, { model: "catalyst series ssl services module", scope: "ne", trust: 0.3, vendor: "cisco", version: "65002.1(2)", }, { model: "catalyst", scope: "ne", trust: 0.3, vendor: "cisco", version: "28209.00.07", }, { model: "catalyst", scope: "ne", trust: 0.3, vendor: "cisco", version: "19009.00.07", }, { model: "cms r17 r4", scope: "ne", trust: 0.3, vendor: "avaya", version: null, }, { model: "cms r16.3 r7", scope: "ne", trust: 0.3, vendor: "avaya", version: null, }, { model: "alienvault", scope: "ne", trust: 0.3, vendor: "alienvault", version: "5.1", }, ], sources: [ { db: "CERT/CC", id: "VU#415294", }, { db: "BID", id: "10183", }, { db: "JVNDB", id: "JVNDB-2004-000150", }, { db: "CNNVD", id: "CNNVD-200408-159", }, { db: "NVD", id: "CVE-2004-0230", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { cpe_match: [ { cpe22Uri: "cpe:/o:ibm:aix", vulnerable: true, }, { cpe22Uri: "cpe:/o:netbsd:netbsd", vulnerable: true, }, { cpe22Uri: "cpe:/h:allied_telesis_k.k.:router", vulnerable: true, }, { cpe22Uri: "cpe:/o:oracle:solaris", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:channel_interface_processor", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:channel_port_adapter", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:8110_router", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:access_registrar", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:aironet", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:aironet_ap340", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:application_and_content_networking_system_software", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ata-180", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:bpx_switch_8600", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:cache_engine", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:call_manager", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:catalyst_1200", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:catalyst_1900", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:catalyst_2800", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:catalyst_2820", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:catalyst_2900", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:catalyst_3000", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:catalyst_3900", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:catalyst_4000", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:catalyst_5000", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:catalyst_6000", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:content_delivery_manager", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:content_distribution_manager", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:content_engine", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:content_router", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:content_switching_module", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:css_11000", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:css_11500", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:element_management_framework", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:fasthub_300", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:fasthub_400", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:firewall_services_module", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:gss_global_site_selector", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:igx_8400", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:info_center", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:intelligent_contact_manager", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:internet_cdn_solution", vulnerable: true, }, { cpe22Uri: "cpe:/o:cisco:ios", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ip_tv", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:lightstream", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:localdirector", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:mds_9000", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:me_1100", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:mgx_8220", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:mgx_8230", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:mgx_8250", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:mgx_8850", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:mgx_8950", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:microhub", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:microswitch", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ons_15100", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ons_15300", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ons_15400", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ons_15500", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ons_15800_dwdm", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ons_15830", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ons_15831", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ons_15832", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:pix_firewall", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:rtm", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:secure_access_control_server", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:secure_ids", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:secure_user_registration_tool", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:sn_5400", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:switchprobe", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:escon_channel_port_adapter", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:parallel_channel_port_adapter", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:traffic_director", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:unity", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:vg248", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:vg248_analog_phone_gateway", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:vpn_3000", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:wan_manager", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:ciscoworks_device_fault_manager", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:ciscoworks_windows", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:hosting_solution_engine", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:ciscoworks_voice_manager", vulnerable: true, }, { cpe22Uri: "cpe:/a:cisco:wireless_lan_solution_engine", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ws-x6608-e1", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ws-x6608-t1", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:ws-x6624-fxs", vulnerable: true, }, { cpe22Uri: "cpe:/h:symantec:nexland_isb_soho_firewall_appliance", vulnerable: true, }, { cpe22Uri: "cpe:/h:symantec:nexland_pro_firewall_appliance", vulnerable: true, }, { cpe22Uri: "cpe:/a:symantec:enterprise_firewall", vulnerable: true, }, { cpe22Uri: "cpe:/a:symantec:firewall_vpn_appliance", vulnerable: true, }, { cpe22Uri: "cpe:/a:symantec:gateway_security_300", vulnerable: true, }, { cpe22Uri: "cpe:/a:symantec:gateway_security_400", vulnerable: true, }, { cpe22Uri: "cpe:/a:symantec:gateway_security_5300", vulnerable: true, }, { cpe22Uri: "cpe:/a:symantec:gateway_security_5400", vulnerable: true, }, { cpe22Uri: "cpe:/a:symantec:symantec_velociraptor", vulnerable: true, }, { cpe22Uri: "cpe:/o:juniper:screenos", vulnerable: true, }, { cpe22Uri: "cpe:/a:checkpoint:provider-1", vulnerable: true, }, { cpe22Uri: "cpe:/a:checkpoint:vpn-1_firewall-1", vulnerable: true, }, { cpe22Uri: "cpe:/h:hp:advancestack_switch", vulnerable: true, }, { cpe22Uri: "cpe:/h:hp:ethertwist_switch", vulnerable: true, }, { cpe22Uri: "cpe:/h:hp:procurve_switch", vulnerable: true, }, { cpe22Uri: "cpe:/h:hp:procurve_routing_switch", vulnerable: true, }, { cpe22Uri: "cpe:/o:microsoft:windows_2000", vulnerable: true, }, { cpe22Uri: "cpe:/o:microsoft:windows-9x", vulnerable: true, }, { cpe22Uri: "cpe:/o:microsoft:windows_server_2003", vulnerable: true, }, { cpe22Uri: "cpe:/o:microsoft:windows_xp", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt", vulnerable: true, }, { cpe22Uri: "cpe:/h:nec:cx3200", vulnerable: true, }, { cpe22Uri: "cpe:/h:nec:ix1000", vulnerable: true, }, { cpe22Uri: "cpe:/h:nec:ix2000", vulnerable: true, }, { cpe22Uri: "cpe:/h:nec:ix3000", vulnerable: true, }, { cpe22Uri: "cpe:/h:nec:ix5000", vulnerable: true, }, { cpe22Uri: "cpe:/h:nec:ix5500", vulnerable: true, }, { cpe22Uri: "cpe:/h:nec:qx", vulnerable: true, }, { cpe22Uri: "cpe:/h:nec:univerge_ip8800_s_r", vulnerable: true, }, { cpe22Uri: "cpe:/h:hitachi:gr2000", vulnerable: true, }, { cpe22Uri: "cpe:/h:hitachi:gr4000", vulnerable: true, }, { cpe22Uri: "cpe:/h:hitachi:gs3000", vulnerable: true, }, { cpe22Uri: "cpe:/h:hitachi:gs4000", vulnerable: true, }, { cpe22Uri: "cpe:/h:hitachi:sanrise", vulnerable: true, }, { cpe22Uri: "cpe:/a:fujitsu:interstage_application_server", vulnerable: true, }, { cpe22Uri: "cpe:/a:fujitsu:interstage_security_director", vulnerable: true, }, { cpe22Uri: "cpe:/a:fujitsu:safegate", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2004-000150", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Discovery is credited to Paul A. Watson.", sources: [ { db: "BID", id: "10183", }, ], trust: 0.3, }, cve: "CVE-2004-0230", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "CVE-2004-0230", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 1.9, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-8660", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [], severity: [ { author: "nvd@nist.gov", id: "CVE-2004-0230", trust: 1, value: "MEDIUM", }, { author: "CARNEGIE MELLON", id: "VU#415294", trust: 0.8, value: "12.90", }, { author: "NVD", id: "CVE-2004-0230", trust: 0.8, value: "Medium", }, { author: "CNNVD", id: "CNNVD-200408-159", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-8660", trust: 0.1, value: "MEDIUM", }, { author: "VULMON", id: "CVE-2004-0230", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CERT/CC", id: "VU#415294", }, { db: "VULHUB", id: "VHN-8660", }, { db: "VULMON", id: "CVE-2004-0230", }, { db: "JVNDB", id: "JVNDB-2004-000150", }, { db: "CNNVD", id: "CNNVD-200408-159", }, { db: "NVD", id: "CVE-2004-0230", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP. A vulnerability exists in the reliance of the Border Gateway Protocol (BGP) on the Transmission Control Protocol (TCP) to maintain persistent sessions. Sustained exploitation of this vulnerability could lead to a denial-of-service condition affecting a large segment of the Internet community. Normal operations would most likely resume shortly after the attack stopped. TCP Has a sequence number TCP There is a problem that it is justified if it is within the window. Therefore, there is a vulnerability that makes it easy to guess the external sequence number when establishing a long-term connection that increases the window size. Note that products affected by this vulnerability TCP Covers many products with implementation. For more information, NISCC-236929 (JVN) , NISCC Advisory 236929 (CPNI Advisory 00391) Please check also.A third party TCP By predicting the sequence number of a particular TCP Service operation interruption such as forcibly terminating a connection (DoS) There is a possibility of being attacked. A vulnerability in TCP implementations may permit unauthorized remote users to reset TCP sessions. This issue affects products released by multiple vendors. Exploiting this issue may permit remote attackers to more easily approximate TCP sequence numbers. This will permit a remote attacker to inject a SYN or RST packet into the session, causing it to be reset and effectively allowing denial-of-service attacks. An attacker would exploit this issue by sending a packet to a receiving implementation with an approximated sequence number and a forged source IP and TCP port. \nFew factors may present viable target implementations, such as imlementations that:\n- depend on long-lived TCP connections\n- have known or easily guessed IP address endpoints\n- have known or easily guessed TCP source ports. As a result, this issue is likely to affect a number of routing platforms. \nNote also that while a number of vendors have confirmed this issue in various products, investigations are ongoing and it is likely that many other vendors and products will turn out to be vulnerable as the issue is investigated further. \nOther consequences may also result from this issue, such as injecting specific data in TCP sessions, but this has not been confirmed. \n**Update: Microsoft platforms are also reported prone to this vulnerability. Vendor reports indicate that an attacker will require knowledge of the IP address and port numbers of the source and destination of an existent legitimate TCP connection in order to exploit this vulnerability on Microsoft platforms. The following products and versions are affected: Oracle Solaris 10, 11; Openpgp 2.6.2; Mcafee Network Data Loss Prevention 8.6 and earlier, 9.2.0, 9.2.1, 9.2.2; Netbsd 1.5, Version 1.5.1, Version 1.5.2, Version 1.5.3, Version 1.6, Version 1.6.1, Version 1.6.2, Version 2.0; Xinuos Openserver Version 5.0.6, Version 5.0.7; Juniper Networks Junos OS; Xinuos Unixware Version 7.1.1, Version 7.1.3. \n\n----------------------------------------------------------------------\n\nWant a new IT Security job?\n\nVacant positions at Secunia:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nAvaya Intuity Audix TCP Connection Reset Vulnerability\n\nSECUNIA ADVISORY ID:\nSA15263\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15263/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n>From remote\n\nOPERATING SYSTEM:\nAvaya Intuity Audix R5\nhttp://secunia.com/product/4586/\n\nDESCRIPTION:\nAvaya has acknowledged a vulnerability in Intuity Audix, which can be\nexploited by malicious people to reset established TCP connections on\na vulnerable system. \n\nFor more information:\nSA11440\n\nSOLUTION:\nA patch will reportedly be included in the next major release. \n\nORIGINAL ADVISORY:\nAvaya:\nhttp://support.avaya.com/elmodocs2/security/ASA-2005-097_SCASA-2005-14.pdf\n\nOTHER REFERENCES:\nSA11440:\nhttp://secunia.com/advisories/11440/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. Routing operations would recover quickly\n after such attacks ended. \n\nI. Description\n\n In 2001, the CERT Coordination Center released CA-2001-09, describing\n statistical weaknesses in various TCP/IP Initial Sequence generators. \n In that document (<http://www.cert.org/advisories/CA-2001-09.html>),\n it was noted by Tim Newsham:\n\n [I]f a sequence number within the receive window is known, an\n attacker can inject data into the session stream or terminate the\n connection. If the ISN value is known and the number of bytes sent\n already sent is known, an attacker can send a simple packet to\n inject data or kill the session. \n\n Paul Watson has performed the statistical analysis of this attack\n when the ISN is not known and has pointed out that such an attack\n could be viable when specifically taking into account the TCP\n Window size. He has also created a proof-of-concept tool\n demonstrating the practicality of the attack. The National\n Infrastructure Security Co-Ordination Centre (NISCC) has published\n an advisory summarizing Paul Watson's analysis in \"NISCC\n Vulnerability Advisory 236929,\" available at\n <http://www.uniras.gov.uk/vuls/2004/236929/index.htm>. \n\n Since TCP is an insecure protocol, it is possible to inject\n transport-layer packets into sessions between hosts given the right\n preconditions. For detailed information about BGP and\n some tips for securing it, please see Cisco System's documentation\n (<http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/bgp.htm>\n or Team Cymru (<http://www.cymru.com/>). This may result in a brief\n loss of service until the fresh routing tables are created. When\n this is taken into account, instead of attempting to send a spoofed\n packet with all potential sequence numbers, the attacker would only\n need to calculate an valid sequence number that falls within the next\n expected ISN plus or minus half the window size. According to Paul Watson's report,\n with a typical xDSL data connection (80 Kbps, upstream) capable of\n sending of 250 packets per second (pps) to a session with a TCP Window\n size of 65,535 bytes, it would be possible to inject a TCP packet\n approximately every 5 minutes. It would take approximately 15 seconds\n with a T-1 (1.544 Mbps) connection. These numbers are significant when\n large numbers of compromised machines (often called \"botnets\" or\n \"zombies\") can be used to generate large amounts of packets that can\n be directed at a particular host. \n\n To protect against such injections, RFC 2385 provides a method of\n using MD5 signatures on the TCP Headers. If this form of verification\n is supported and enabled between two peers, then an attacker would\n have to obtain the key used to transmit the packet in order to\n successfully inject a packet into the TCP session. Another alternative\n would be to tunnel BGP over IPSec. Again, this would provide a form of\n authentication between the BGP peers and the data that they transmit. \n The lack of authentication when using TCP for BGP makes this type of\n attack more viable. \n\n US-CERT is tracking this issue as VU#415294. This reference number\n corresponds to CVE candidate CAN-2004-0230. NISCC is tracking this\n issue as Advisory 236929. \n\nII. Impacts could range from data corruption or session\n hijacking to a denial-of-service condition. \n\nIII. Solution\n\nApply a patch from your vendor\n\n Please see you vendor's statement regarding the availability of\n patches, updates and mitigation strategies. The lack of cryptographically-strong\n security options for the TCP header itself is a deficiency that\n technologies like IPSec try to address. It must be noted that in the\n final analysis that if an attacker has the ability to see unencrypted\n TCP traffic generated from a site, that site is vulnerable to various\n TCP attacks - not just those mentioned here. A stronger measure that\n would aid in protecting against such TCP attacks is end-to-end\n cryptographic solutions like those outlined in various IPSec\n documents. \n\n The key idea with an end-to-end cryptographic solution is that there\n is some secure verification that a given packet belongs in a\n particular stream. However, the communications layer at which this\n cryptography is implemented will determine its effectiveness in\n repelling ISN based attacks. Solutions that operate above the\n Transport Layer (OSI Layer 4), such as SSL/TLS and SSH1/SSH2, only\n prevent arbitrary packets from being inserted into a session. They are\n unable to prevent a connection reset (denial of service) since the\n connection handling will be done by a lower level protocol (i.e.,\n TCP). On the other hand, Network Layer (OSI Layer 3) cryptographic\n solutions such as IPSec prevent both arbitrary packets entering a\n transport-layer stream and connection resets because connection\n management is directly integrated into the secure Network Layer\n security model. \n\n The solutions presented above have the desirable attribute of not\n requiring any changes to the TCP protocol or implementations to be\n made. RFC2385 (\"Protection of BGP Sessions via the TCP MD5\n Signature Option\") and other technologies provide options for adding\n cryptographic protection within the TCP header at the cost of some\n potential denial of service, interoperability, and performance issues. \n\nIngress filtering\n\n Ingress filtering manages the flow of traffic as it enters a network\n under your administrative control. You can configure your BGP routers\n to only accept packets on a specific network connection. Servers are\n typically the only machines that need to accept inbound connections\n from the public Internet. In the network usage policy of many sites,\n there are few reasons for external hosts to initiate inbound\n connections to machines that provide no public services. Thus, ingress\n filtering should be performed at the border to prohibit externally\n initiated inbound connections to non-authorized services. In this\n fashion, the effectiveness of many intruder scanning techniques can be\n dramatically reduced. \n\nNetwork Isolation\n\n Complex networks can benefit by separating data channels and control\n channels, such as BGP, into different logical or physical networks. \n Technologies such as VLANs, VPNs, leased links, NAT may all be able to\n contribute to separating the tranmission of control information from\n the transmission of the data stream. \n\nEgress filtering\n\n Egress filtering manages the flow of traffic as it leaves a network\n under your administrative control. There is typically limited need for\n machines providing public services to initiate outbound connections to\n the Internet. \n\n In the case of BGP, only your BGP routers should be establishing\n connections to your peers. Other BGP traffic generated on your network\n could be a sign of an attempted attack. \n\nAppendix A. As\n vendors report new information to US-CERT, we will update the\n vulnerability note. If a particular vendor is not listed in either the\n NISCC advisory, or the vulnerability, we recommend that you contact\n them for their comments. \n _________________________________________________________________\n\n US-CERT thanks Paul Watson, Cisco Systems and NISCC for notifying us\n about this problem and for helping us to construct this advisory. \n _________________________________________________________________\n\n Feedback can be directed to the US-CERT Technical Staff. \n _________________________________________________________________\n\n Copyright 2004 Carnegie Mellon University. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nCisco Security Advisory:\\xa0TCP Vulnerabilities in Multiple IOS-Based Cisco\nProducts\n\nRevision 1.0\n\nFor Public Release 2004 April 20 21:00 UTC (GMT)\n\n- -------------------------------------------------------------------------\nSummary\n=======\nA vulnerability in the Transmission Control Protocol (TCP) specification\n(RFC793) has been discovered by an external researcher. The successful\nexploitation enables an adversary to reset any established TCP connection\nin a much shorter time than was previously discussed publicly. Depending\non the application, the connection may get automatically re-established. \nIn other cases, a user will have to repeat the action (for example, open\na new Telnet or SSH session). Depending upon the attacked protocol, a\nsuccessful attack may have additional consequences beyond terminated\nconnection which must be considered. This attack vector is only\napplicable to the sessions which are terminating on a device (such as a\nrouter, switch, or computer) and not to the sessions that are only\npassing through the device (for example, transit traffic that is being\nrouted by a router). In addition, this attack vector does not directly\ncompromise data integrity or confidentiality. \n\nThis advisory is available at \nhttp://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml, \nand it describes this vulnerability as it applies to Cisco products that \nrun Cisco IOS\\xae software. \n\nA companion advisory that describes this vulnerability for products that\ndo not run Cisco IOS software is available at \nhttp://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml. The severity of the exposure\ndepends upon the protocols and applications that utilize TCP. \n\nThis attack vector is only applicable to the sessions which are\nterminating on a device (such as a router, switch, or computer), and not\nto the sessions that are only passing through the device (for example,\ntransit traffic that is being routed by a router). \n\nDetails\n=======\nTCP is the transport layer protocol designed to provide\nconnection-oriented reliable delivery of a data stream. To accomplish\nthis, TCP uses a mixture of flags to indicate state and sequence numbers\nto identify the order in which the packets are to be reassembled. The acknowledgement number is not used in a packet with the\nreset (RST) flag set because a reset does not expect a packet in return. \nThe full specification of the TCP protocol can be found at \nhttp://www.ietf.org/rfc/rfc0793.txt. \n\nAccording to the RFC793 specification, it is possible to reset an\nestablished TCP connection by sending a packet with the RST or\nsynchronize (SYN) flag set. However, the sequence number does not\nhave to be an exact match; it is sufficient to fall within the advertised\nwindow. This significantly decreases the effort required by an adversary:\nthe larger the window, the easier it is to reset the connection. The destination TCP port is usually\nknown for all standard services (for example, 23 for Telnet, 80 for\nHTTP). Cisco IOS software uses predictable ephemeral ports for known\nservices with a predictable increment (the next port which will be used\nfor a subsequent connection). These values, while constant for a\nparticular Cisco IOS software version and protocol, can vary from one\nrelease to another. \n\nHere is an example of a normal termination of a TCP session:\n \n \n Host(1) Host(2)\n | |\n | |\n | ACK ack=1001, window=5000 |\n |<----------------------------|\n | |\n \n \n \n Host(1) is\n \n closing the session\n \n \n \n | RST seq=1001 |\n |---------------------------->|\n | |\n \n \n \n Host(2) is\n \n closing the session\n \n \nIn addition, the following scenario is also permitted:\n \n \n Host(1) Host(2)\n | |\n | |\n | ACK ack=1001, window=5000 |\n |<----------------------------|\n | |\n \n \n \n Host(1) is\n \n closing the session\n \n \n \n | RST seq=4321 |\n |---------------------------->|\n | |\n \n \n \n Host(2) is\n \n closing the session\n \n \nNote how, in the second example, the RST packet was able to terminate the\nsession although the sequence number was not the next expected one (which\nis 1001). \n\nAs a general rule, all protocols where a TCP connection stays established\nfor longer than one minute should be considered exposed. \n\nThe exposure on this vulnerability can be described as follows:\n \n \n * Cisco IOS - All devices running Cisco IOS software are vulnerable. Sessions passing through the device are vulnerable only if\n the originating or receiving device is vulnerable, but they cannot be\n attacked on the router itself. This vulnerability does not compromise\n data integrity or confidentiality. It only affects availability. \n \n This vulnerability is documented in the Cisco Bug Toolkit as Bug IDs \n CSCed27956 ( registered customers only) and CSCed38527 ( registered\n customers only) . \n \n \n * Cisco IOS Firewall (IOS FW) - The Cisco IOS FW monitors packets\n passing throughout the router and maintains the session state\n internally. This way, it is possible to \"open\" required ports and\n allow traffic to pass and then close them after the session has\n finished. Since Cisco IOS FW intercepts and examines all packets\n passing through the device, all TCP sessions passing through the\n Cisco IOS FW are vulnerable to this attack. This is valid even if the\n originating and receiving devices themselves are not vulnerable. \n \n This vulnerability is documented in the Cisco Bug Toolkit as Bug ID \n CSCed93836 ( registered customers only) . \n \n \n * Network Address Translation (NAT) - This vulnerability does not have\n any effect on NAT. The NAT functionality simply rewrites ports and IP\n addresses. This feature does not interprete TCP flags and therefore\n is not vulnerable to this attack. However, the attacking packet will\n be passed through the router and the receiving device can be\n affected. \n \n\nImpact\n======\nThe impact will be different for each specific protocol. While in the\nmajority of cases a TCP connection will be automatically re-established,\nin some specific protocols a second order of consequences may have a\nlarger impact than tearing down the connection itself. Both external and internal (eBGP and iBGP) sessions\nare equally vulnerable. If an adversary tears down a BGP session between\ntwo routers, then all routes which were advertised between these two\npeers will be withdrawn. This would occur immediately for the router\nwhich has been attacked and after the next update/keepalive packet is\nsent by the other router. The BGP peering session itself will be\nre-established within a minute after the attack. Depending upon the exact\nrouting configuration, withdrawal of the routes may have any of the\nfollowing consequences:\n \n \n * No adverse effects at all if an appropriate static route(s) has(have)\n been defined on both sides of the affected session. \n \n * The traffic will be rerouted along other paths. This may cause some\n congestion along these paths. \n \n * A portion of the network will be completely isolated and unreachable. \n \n\nIf a BGP peering session is broken a few times within a short time\ninterval, then BGP route dampening may be invoked. Dampening means that\naffected routes will be withdrawn from the Internet routing table for\nsome period of time. By default that time is 45 minutes. During that\ntime, all of the traffic whose route was advertised over the attacked BGP\nsession will either be rerouted or a portion of the network will be\nunreachable. Route dampening is not enabled by default. \n\nCisco IOS Firewall Feature Set\n- ------------------------------\nIt is possible to terminate an established TCP-based connection even if\nboth endpoints are not vulnerable to this attack. \n\nSoftware Versions and Fixes\n===========================\nEach row of the table describes a release train and the platforms or\nproducts for which it is intended. If a given release train is\nvulnerable, then the earliest possible releases that contain the fix and\nthe anticipated date of availability for each are listed in the Rebuild,\nInterim, and Maintenance columns. In some cases, no rebuild of a\nparticular release is planned; this is marked with the label \"Not\nscheduled.\" A device running any release in the given train that is\nearlier than the release in a specific column (less than the earliest\nfixed release) is known to be vulnerable, and it should be upgraded at\nleast to the indicated release or a later version (greater than the\nearliest fixed release label). \n\nWhen selecting a release, keep in mind the following definitions:\n \n \n * Maintenance\n Most heavily tested and highly recommended release of any label in a\n given row of the table. \n \n \n * Rebuild\n Constructed from the previous maintenance or major release in the\n same train, it contains the fix for a specific vulnerability. \n Although it receives less testing, it contains only the minimal\n changes necessary to effect the repair. Cisco has made available\n several rebuilds of mainline trains to address this vulnerability,\n but strongly recommends running only the latest maintenance release\n on mainline trains. \n \n \n * Interim\n Built at regular intervals between maintenance releases and receives\n less testing. Interims should be selected only if there is no other\n suitable release that addresses the vulnerability, and interim images\n should be upgraded to the next available maintenance release as soon\n as possible. Interim releases are not available through\n manufacturing, and usually they are not available for customer\n download from CCO without prior arrangement with the Cisco Technical\n Assistance Center (TAC). \n \n\nIn all cases, customers should exercise caution to be certain the devices\nto be upgraded contain sufficient memory and that current hardware and\nsoftware configurations will continue to be supported properly by the new\nrelease. If the information is not clear, contact the Cisco TAC for\nassistance, as shown in the section following this table. \n\nFixed Cisco IOS Software Images for Cisco IOS Firewall\n\n+------------+---------------------------------+\n| Major | Availability of Repaired |\n| Release | Releases* |\n+------------+---------+---------+-------------+\n| Affected | Rebuild | Interim | Maintenance |\n| 12.1-Based | | ** | |\n| Release | | | |\n+------------+---------+---------+-------------+\n| 12.1 | 12.1 | | |\n| | (22c) | | |\n+------------+---------+---------+-------------+\n| 12.1E | 12.1 | | |\n| | (19)E7 | | |\n| +---------+---------+-------------+\n| | | | |\n+------------+---------+---------+-------------+\n| Affected | Rebuild | Interim | Maintenance |\n| 12.2-Based | | ** | |\n| Release | | | |\n+------------+---------+---------+-------------+\n| 12.2 | 12.2 | | |\n| | (21b) | | |\n| +---------+---------+-------------+\n| | 12.2 | | |\n| | (23a) | | |\n+------------+---------+---------+-------------+\n| 12.2T | 12.2 | | |\n| | (11)T11 | | |\n| +---------+---------+-------------+\n| | 12.2 | | |\n| | (13)T12 | | |\n| +---------+---------+-------------+\n| | 12.2 | | |\n| | (15)T12 | | |\n+------------+---------+---------+-------------+\n| Affected | Rebuild | Interim | Maintenance |\n| 12.3-Based | | ** | |\n| Release | | | |\n+------------+---------+---------+-------------+\n| 12.3 | 12.3 | | |\n| | (5c) | | |\n| +---------+---------+-------------+\n| | 12.3 | | |\n| | (6a) | | |\n+------------+---------+---------+-------------+\n| 12.3T | 12.3(4) | | |\n| | T4 | | |\n+------------+---------+---------+-------------+\n\nFixed Cisco IOS Software Releases and Migration Path\n\n+----------+-------------------------------------+\n| Major | Availability of Repaired Releases* |\n| Release | |\n+----------+-------------+---------+-------------+\n| Affected | Rebuild | Interim | Maintenance |\n| 11.1 | | ** | |\n| -Based | | | |\n| Release | | | |\n+----------+-------------+---------+-------------+\n| 11.1 | 11.1 Vulnerable. Migrate to 11.2 |\n+----------+-------------------------------------+\n| 11.1AA | 11.1AA Vulnerable. Migrate to 11.2P |\n+----------+-------------------------------------+\n| 11.1CC | 11.1CC Vulnerable. Migrate to 12.0 |\n+----------+-------------+---------+-------------+\n| Affected | Rebuild | Interim | Maintenance |\n| 11.2 | | ** | |\n| -Based | | | |\n| Release | | | |\n+----------+-------------+---------+-------------+\n| 11.2 | 11.2(26f) | | |\n| | Available | | |\n| | on | | |\n| | 2004-Apr-21 | | |\n+----------+-------------+---------+-------------+\n| 11.2P | 11.2(26)P6 | | |\n| | Available | | |\n| | on | | |\n| | 2004-Apr-21 | | |\n+----------+-------------+---------+-------------+\n| 11.2SA | 11.2(8)SA6 Vulnerable. Migrate to |\n| | 12.0 |\n+----------+-------------+---------+-------------+\n| Affected | Rebuild | Interim | Maintenance |\n| 11.3 | | ** | |\n| -Based | | | |\n| Release | | | |\n+----------+-------------+---------+-------------+\n| 11.3 | 11.3 Vulnerable. Migrate to 12.0 |\n| +-------------+---------+-------------+\n| | 11.3(11b)T4 | | |\n| | Available | | |\n| | on | | |\n| | 2004-Apr-21 | | |\n| +-------------+---------+-------------+\n| | 11.3(11e) | | |\n| | Available | | |\n| | on | | |\n| | 2004-Apr-21 | | |\n+----------+-------------+---------+-------------+\n| Affected | Rebuild | Interim | Maintenance |\n| 12.0 | | ** | |\n| -Based | | | |\n| Release | | | |\n+----------+-------------+---------+-------------+\n| 12.0 | 12.0(28) | | |\n+----------+-------------+---------+-------------+\n| 12.0DA | 12.0DA Vulnerable. Migrate to |\n| | 12.2DA |\n+----------+-------------------------------------+\n| 12.0DB | 12.0DB Vulnerable. Migrate to |\n| | 12.1DB |\n+----------+-------------------------------------+\n| 12.0DC | 12.0DC Vulnerable. Migrate to |\n| | 12.1DC |\n+----------+-------------+---------+-------------+\n| 12.0S | 12.0(27)S | | |\n| +-------------+---------+-------------+\n| | 12.0(26)S2 | | |\n| +-------------+---------+-------------+\n| | 12.0(16)S11 | | |\n| +-------------+---------+-------------+\n| | 12.0(24)S5 | | |\n| +-------------+---------+-------------+\n| | 12.0(25)S3 | | |\n| +-------------+---------+-------------+\n| | 12.0(23)S6 | | |\n+----------+-------------+---------+-------------+\n| 12.0SL | 12.0SL Vulnerable. Migrate to 12.0 |\n| | (23)S3 |\n+----------+-------------------------------------+\n| 12.0ST | 12.0ST Vulnerable. Migrate to 12.0 |\n| | (26)S2 |\n+----------+-------------------------------------+\n| 12.0SX | 12.0(25)SX4 Not built - contact TAC |\n+----------+-------------------------------------+\n| 12.0SZ | 12.0SZ Vulnerable. Migrate to 12.0 |\n| | (26)S2 |\n+----------+-------------------------------------+\n| 12.0T | 12.0T Vulnerable. Migrate to 12.1 |\n+----------+-------------+---------+-------------+\n| 12.0W5 | 12.0(28)W5 | | |\n| | (30) | | |\n+----------+-------------+---------+-------------+\n| 12.0WC | 12.0(5)WC9a | | |\n| | Available | | |\n| | on | | |\n| | 2004-Apr-21 | | |\n+----------+-------------+---------+-------------+\n| 12.0WT | 12.0(13)WT Vulnerable. End of |\n| | Engineering |\n+----------+-------------------------------------+\n| 12.0WX | 12.0(4)WX Vulnerable. Migrate to |\n| | 12.0W5 |\n+----------+-------------------------------------+\n| 12.0XA | 12.0(1)XA Vulnerable. Migrate to |\n| | 12.1 Latest |\n+----------+-------------------------------------+\n| 12.0XB | 12.0(1)XB Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.0XC | 12.0(2)XC Vulnerable. Migrate to |\n| | 12.1 Latest |\n+----------+-------------------------------------+\n| 12.0XD | 12.0(2)XD Vulnerable. Migrate to |\n| | 12.1 Latest |\n+----------+-------------------------------------+\n| 12.0XE | 12.0(7)XE Vulnerable. Migrate to |\n| | 12.1E Latest |\n+----------+-------------------------------------+\n| 12.0XG | 12.0(3)XG Vulnerable. Migrate to |\n| | 12.1 Latest |\n+----------+-------------------------------------+\n| 12.0XH | 12.0(4)XH Vulnerable. Migrate to |\n| | 12.1 |\n+----------+-------------------------------------+\n| 12.0XI | 12.0(4)XI Vulnerable. Migrate to |\n| | 12.1 |\n+----------+-------------------------------------+\n| 12.0XJ | 12.0(4)XJ Vulnerable. Migrate to |\n| | 12.1 Latest |\n+----------+-------------------------------------+\n| 12.0XK | 12.0(7)XK Vulnerable. Migrate to |\n| | 12.1T Latest |\n+----------+-------------------------------------+\n| 12.0XL | 12.0(4)XL Vulnerable. Migrate to |\n| | 12.2 Latest |\n+----------+-------------------------------------+\n| 12.0XM | 12.0(4)XM Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.0XN | 12.0(5)XN Vulnerable. Migrate to |\n| | 12.1 Latest |\n+----------+-------------------------------------+\n| 12.0XP | 12.0(5.1)XP Vulnerable. Migrate to |\n| | 12.1 Latest |\n+----------+-------------------------------------+\n| 12.0XQ | 12.0(5)XQ Vulnerable. Migrate to |\n| | 12.1 Latest |\n+----------+-------------------------------------+\n| 12.0XR | 12.0(7)XR Vulnerable. Migrate to |\n| | 12.2 Latest |\n+----------+-------------------------------------+\n| 12.0XS | 12.0(5)XS Vulnerable. Migrate to |\n| | 12.1E Latest |\n+----------+-------------------------------------+\n| 12.0XU | 12.0(5)XU Vulnerable. Migrate to |\n| | 12.0(5)WC |\n+----------+-------------------------------------+\n| 12.0XV | 12.0(7)XV Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------+---------+-------------+\n| Affected | Rebuild | Interim | Maintenance |\n| 12.1 | | ** | |\n| -Based | | | |\n| Release | | | |\n+----------+-------------+---------+-------------+\n| 12.1 | 12.1(20a) | | |\n| +-------------+---------+-------------+\n| | 12.1(4c) | | |\n| +-------------+---------+-------------+\n| | 12.1(22a) | | |\n+----------+-------------+---------+-------------+\n| 12.1AA | 12.1(10)AA Vulnerable. Migrate to |\n| | 12.2 Latest |\n+----------+-------------+---------+-------------+\n| 12.1AX | 12.1(14)AX | | |\n+----------+-------------+---------+-------------+\n| 12.1AY | 12.1(13)AY Vulnerable. Migrate to |\n| | 12.1(14)EA1 |\n+----------+-------------------------------------+\n| 12.1DA | 12.2DA Vulnerable. Migrate to |\n| | 12.2DA |\n+----------+-------------------------------------+\n| 12.1DB | 12.1(5)DB Vulnerable. Migrate to |\n| | 12.2B |\n+----------+-------------+---------+-------------+\n| 12.1E | 12.1(19)E7 | | |\n| +-------------+---------+-------------+\n| | 12.1(22)E1 | | |\n| +-------------+---------+-------------+\n| | 12.1(11b) | | |\n| | E14 | | |\n| +-------------+---------+-------------+\n| | 12.1(20)E2 Not built - contact TAC |\n| +-------------+---------+-------------+\n| | 12.1(19)E6 | | |\n| +-------------+---------+-------------+\n| | 12.1(13)E13 | | |\n| +-------------+---------+-------------+\n| | 12.1(8b)E18 | | |\n| +-------------+---------+-------------+\n| | 12.1(14)E10 | | |\n| +-------------+---------+-------------+\n| | 12.1(13)E14 | | |\n+----------+-------------+---------+-------------+\n| 12.1EA | 12.1(20)EA1 | | |\n+----------+-------------+---------+-------------+\n| 12.1EB | 12.1(20)EB | | |\n+----------+-------------+---------+-------------+\n| 12.1EC | 12.1(20)EC | | |\n+----------+-------------+---------+-------------+\n| 12.1EO | 12.1(20)EO | | |\n| +-------------+---------+-------------+\n| | 12.1(19)EO2 | | |\n| | Available | | |\n| | on | | |\n| | 2004-Apr-25 | | |\n+----------+-------------+---------+-------------+\n| 12.1EU | 12.1(20)EU | | |\n+----------+-------------+---------+-------------+\n| 12.1EV | 12.1(12c)EV Vulnerable. Migrate to |\n| | 12.2(RLS4)S |\n+----------+-------------+---------+-------------+\n| 12.1EW | 12.1(20)EW2 | | |\n| | Available | | |\n| | on | | |\n| | 2004-Apr-21 | | |\n+----------+-------------+---------+-------------+\n| 12.1EX | 12.1EX Vulnerable. Migrate to 12.1 |\n| | (14)E |\n+----------+-------------------------------------+\n| 12.1EY | 12.1(10)EY Vulnerable. Migrate to |\n| | 12.1(14)E |\n+----------+-------------+---------+-------------+\n| 12.1T | 12.1(5)T17 | | |\n+----------+-------------+---------+-------------+\n| 12.1XA | 12.1(1)XA Vulnerable. Migrate to |\n| | 12.1(5)T18 |\n+----------+-------------------------------------+\n| 12.1XB | 12.1(1)XB Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.1XC | 12.1(1)XC Vulnerable. Migrate to |\n| | 12.2 |\n+----------+-------------------------------------+\n| 12.1XD | 12.1(1)XD Vulnerable. Migrate to |\n| | 12.2 |\n+----------+-------------------------------------+\n| 12.1XE | 12.1(1)XE Vulnerable. Migrate to |\n| | 12.1E Latest |\n+----------+-------------------------------------+\n| 12.1XF | 12.1(2)XF Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.1XG | 12.1(3)XG Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.1XH | 12.1(2a)XH Vulnerable. Migrate to |\n| | 12.2 |\n+----------+-------------------------------------+\n| 12.1XI | 12.1(3a)XI Vulnerable. Migrate to |\n| | 12.2 Latest |\n+----------+-------------------------------------+\n| 12.1XJ | 12.1(3)XJ Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.1XL | 12.1(3)XL Vulnerable. Migrate to |\n| | 12.2T Latest |\n+----------+-------------------------------------+\n| 12.1XM | 12.1(5)XM Vulnerable. Migrate to |\n| | 12.2T Latest |\n+----------+-------------------------------------+\n| 12.1XP | 12.1(3)XP Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.1XQ | 12.1(3)XQ Vulnerable. Migrate to |\n| | 12.2T Latest |\n+----------+-------------------------------------+\n| 12.1XR | 12.1(5)XR Vulnerable. Migrate to |\n| | 12.2T Latest |\n+----------+-------------------------------------+\n| 12.1XT | 12.1(3)XT Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.1XU | 12.1(5)XU Vulnerable. Migrate to |\n| | 12.2T Latest |\n+----------+-------------------------------------+\n| 12.1XV | 12.1(5)XV Vulnerable. Migrate to |\n| | 12.2XB |\n+----------+-------------------------------------+\n| 12.1YA | 12.1(5)YA Vulnerable. Migrate to |\n| | 12.2(8)T |\n+----------+-------------------------------------+\n| 12.1YB | 12.1(5)YB Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.1YC | 12.1(5)YC Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.1YD | 12.1(5)YD Vulnerable. Migrate to |\n| | 12.2(8)T |\n+----------+-------------------------------------+\n| 12.1YE | 12.1(5)YE5 Vulnerable. Migrate to |\n| | 12.2(2)YC |\n+----------+-------------------------------------+\n| 12.1YF | 12.1(5)YF2 Vulnerable. Migrate to |\n| | 12.2(2)YC |\n+----------+-------------------------------------+\n| 12.1YH | 12.1(5)YH2 Vulnerable. Migrate to |\n| | 12.2(13)T |\n+----------+-------------------------------------+\n| 12.1YI | 12.1(5)YI2 Vulnerable. Migrate to |\n| | 12.2(2)YC |\n+----------+-------------------------------------+\n| 12.1YJ | 12.1(11)YJ Vulnerable. Migrate to |\n| | 12.1EA Latest |\n+----------+-------------+---------+-------------+\n| Affected | Rebuild | Interim | Maintenance |\n| 12.2 | | ** | |\n| -Based | | | |\n| Release | | | |\n+----------+-------------+---------+-------------+\n| 12.2 | 12.2(19b) | | |\n| +-------------+---------+-------------+\n| | 12.2(16f) | | |\n| +-------------+---------+-------------+\n| | 12.2(21a) | | |\n| +-------------+---------+-------------+\n| | 12.2(23) | | |\n| +-------------+---------+-------------+\n| | 12.2(12i) | | |\n| +-------------+---------+-------------+\n| | 12.2(10g) | | |\n| +-------------+---------+-------------+\n| | 12.2(13e) | | |\n| +-------------+---------+-------------+\n| | 12.2(17d) | | |\n| +-------------+---------+-------------+\n| | 12.2(21b) | | |\n| +-------------+---------+-------------+\n| | 12.2(23a) | | |\n+----------+-------------+---------+-------------+\n| 12.2B | 12.2(2)B - 12.2(4)B7 Vulnerable. |\n| | Migrate to 12.2(13)T12 |\n| +-------------------------------------+\n| | 12.2(4)B8 AND FWD Vulnerable. |\n| | Migrate to 12.3(5a)B1 |\n+----------+-------------+---------+-------------+\n| 12.2BC | 12.2(15) | | |\n| | BC1C | | |\n+----------+-------------+---------+-------------+\n| 12.2BW | 12.2(4)BW Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------+---------+-------------+\n| 12.2BX | 12.2(16)BX2 | | |\n+----------+-------------+---------+-------------+\n| 12.2BY | 12.2(4)BY Vulnerable. Migrate to |\n| | 12.2(15)B |\n| +-------------------------------------+\n| | 12.2(8)BY Vulnerable. Migrate to |\n| | 12.2(8)ZB |\n| +-------------------------------------+\n| | 12.2(2)BY Vulnerable. Migrate to |\n| | 12.2(8)BZ |\n+----------+-------------------------------------+\n| 12.2BZ | 12.2(15)BZ Vulnerable. Migrate to |\n| | 12.2(16)BX |\n+----------+-------------------------------------+\n| 12.2CX | 12.2(11)CX Vulnerable. Migrate to |\n| | 12.2(15)BC |\n+----------+-------------------------------------+\n| 12.2CY | 12.2(11)CY Vulnerable. Migrate to |\n| | 12.2(13)BC1C |\n+----------+-------------------------------------+\n| 12.2DD | 12.2DD Vulnerable. Migrate to 12.2 |\n| | (4)B1 |\n+----------+-------------------------------------+\n| 12.2DX | 12.2(1)DX Vulnerable. Migrate to |\n| | 12.2DD |\n| +-------------------------------------+\n| | 12.2(2)DX Vulnerable. Migrate to |\n| | 12.2B Latest |\n+----------+-------------+---------+-------------+\n| 12.2EW | 12.2(18)EW | | |\n+----------+-------------+---------+-------------+\n| 12.2JA | 12.2(13)JA4 | | |\n| +-------------+---------+-------------+\n| | 12.2(13)JA2 | | |\n| +-------------+---------+-------------+\n| | 12.2(11)JA3 | | |\n+----------+-------------+---------+-------------+\n| 12.2MC | 12.2(15) | | |\n| | MC1B | | |\n+----------+-------------+---------+-------------+\n| 12.2S | 12.2(22)S | | |\n| +-------------+---------+-------------+\n| | 12.2(14)S7 | | |\n| +-------------+---------+-------------+\n| | 12.2(20)S1 | | |\n| +-------------+---------+-------------+\n| | 12.2(20)S3 | | |\n| | Available | | |\n| | on | | |\n| | 2004-Apr-21 | | |\n| +-------------+---------+-------------+\n| | 12.2(18)S3 | | |\n+----------+-------------+---------+-------------+\n| 12.2SE | 12.2(18)SE | | |\n+----------+-------------+---------+-------------+\n| 12.2SW | 12.2(21)SW | | |\n+----------+-------------+---------+-------------+\n| 12.2SX | 12.2(17a) | | |\n| | SX2 | | |\n+----------+-------------+---------+-------------+\n| 12.2SXA | 12.2(17b) | | |\n| | SXA1 | | |\n+----------+-------------+---------+-------------+\n| 12.2SXB | 12.2(17d)SXB1 Not built - contact |\n| | TAC |\n+----------+-------------+---------+-------------+\n| 12.2SY | 12.2(14)SY3 | | |\n+----------+-------------+---------+-------------+\n| 12.2SZ | 12.2(14)SZ6 | | |\n+----------+-------------+---------+-------------+\n| 12.2T | 12.2(15)T11 | | |\n| +-------------+---------+-------------+\n| | 12.2(13)T12 | | |\n| +-------------+---------+-------------+\n| | 12.2(11)T11 Not built - contact TAC |\n| +-------------+---------+-------------+\n| | 12.2(13)T11 | | |\n+----------+-------------+---------+-------------+\n| 12.2XA | 12.2(2)XA Vulnerable. Migrate to |\n| | 12.2(11)T |\n+----------+-------------------------------------+\n| 12.2XB | 12.2(2)XB Vulnerable. Migrate to |\n| | 12.2(15)T |\n+----------+-------------------------------------+\n| 12.2XC | 12.2(2)XC Vulnerable. Migrate to |\n| | 12.2(8)ZB |\n+----------+-------------------------------------+\n| 12.2XD | 12.2(1)XD Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2XE | 12.2(1)XE Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2XF | 12.2(1)XF1 Vulnerable. Migrate to |\n| | 12.2(4)BC1C |\n+----------+-------------------------------------+\n| 12.2XG | 12.2(2)XG Vulnerable. Migrate to |\n| | 12.2(8)T |\n+----------+-------------------------------------+\n| 12.2XH | 12.2(2)XH Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2XI | 12.2(2)XI2 Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2XJ | 12.2(2)XJ Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2XK | 12.2(2)XK Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2XL | 12.2(4)XL Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2XM | 12.2(4)XM Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2XN | 12.2(2)XN Vulnerable. Migrate to |\n| | 12.2(11)T |\n+----------+-------------------------------------+\n| 12.2XQ | 12.2(2)XQ Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2XS | 12.2(1)XS Vulnerable. Migrate to |\n| | 12.2(11)T |\n+----------+-------------------------------------+\n| 12.2XT | 12.2(2)XT Vulnerable. Migrate to |\n| | 12.2(11)T |\n+----------+-------------------------------------+\n| 12.2XU | 12.2(2)XU Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2XW | 12.2(4)XW Vulnerable. Migrate to |\n| | 12.2(13)T12 |\n+----------+-------------------------------------+\n| 12.2YA | 12.2(4)YA Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2YB | 12.2(4)YB Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2YC | 12.2(2)YC Vulnerable. Migrate to |\n| | 12.2(11)T11 |\n+----------+-------------------------------------+\n| 12.2YD | 12.2(8)YD Vulnerable. Migrate to |\n| | 12.2(8)YY |\n+----------+-------------------------------------+\n| 12.2YE | 12.2(9)YE Vulnerable. Migrate to |\n| | 12.2S |\n+----------+-------------------------------------+\n| 12.2YF | 12.2(4)YF Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2YG | 12.2(4)YG Vulnerable. Migrate to |\n| | 12.2(13)T12 |\n+----------+-------------------------------------+\n| 12.2YH | 12.2(4)YH Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2YJ | 12.2(8)YJ Vulnerable. Migrate to |\n| | 12.2(15)T12 |\n+----------+-------------------------------------+\n| 12.2YK | 12.2(2)YK Vulnerable. Migrate to |\n| | 12.2(13)ZC |\n+----------+-------------------------------------+\n| 12.2YL | 12.2(8)YL Vulnerable. Migrate to |\n| | 12.3(2)T |\n+----------+-------------------------------------+\n| 12.2YM | 12.2(8)YM Vulnerable. Migrate to |\n| | 12.3(2)T |\n+----------+-------------------------------------+\n| 12.2YN | 12.2(8)YN Vulnerable. Migrate to |\n| | 12.3(2)T |\n+----------+-------------------------------------+\n| 12.2YO | 12.2(9)YO Vulnerable. Migrate to |\n| | 12.2(14)SY |\n+----------+-------------------------------------+\n| 12.2YP | 12.2(11)YP Vulnerable. Migrate to |\n| | 12.2T Latest |\n+----------+-------------------------------------+\n| 12.2YQ | 12.2(11)YQ Vulnerable. Migrate to |\n| | 12.3(2)T |\n+----------+-------------------------------------+\n| 12.2YR | 12.2(11)YR Vulnerable. Migrate to |\n| | 12.3(2)T |\n+----------+-------------------------------------+\n| 12.2YS | 12.2(11)YS Vulnerable. Migrate to |\n| | 12.3T |\n+----------+-------------------------------------+\n| 12.2YT | 12.2(11)YT Vulnerable. Migrate to |\n| | 12.2(15)T |\n+----------+-------------------------------------+\n| 12.2YU | 12.2(11)YU Vulnerable. Migrate to |\n| | 12.3(2)T |\n+----------+-------------------------------------+\n| 12.2YV | 12.2(11)YV Vulnerable. Migrate to |\n| | 12.3(4)T |\n+----------+-------------------------------------+\n| 12.2YW | 12.2(8)YW Vulnerable. Migrate to |\n| | 12.3(2)T |\n+----------+-------------------------------------+\n| 12.2YX | 12.2(11)YX Vulnerable. Migrate to |\n| | 12.2(RLS3)S |\n+----------+-------------------------------------+\n| 12.2YY | 12.2(8)YY Vulnerable. Migrate to |\n| | 12.3(1)T |\n+----------+-------------------------------------+\n| 12.2YZ | 12.2(11)YZ Vulnerable. Migrate to |\n| | 12.2(14)SZ |\n+----------+-------------+---------+-------------+\n| 12.2ZA | 12.2(14)ZA6 | | |\n+----------+-------------+---------+-------------+\n| 12.2ZB | 12.2(8)ZB Vulnerable. Migrate to |\n| | 12.3T |\n+----------+-------------------------------------+\n| 12.2ZC | 12.2(13)ZC Vulnerable. Migrate to |\n| | 12.3T |\n+----------+-------------+---------+-------------+\n| 12.2ZD | 12.2(13)ZD1 | | |\n+----------+-------------+---------+-------------+\n| 12.2ZE | 12.2(13)ZE Vulnerable. Migrate to |\n| | 12.3 |\n+----------+-------------------------------------+\n| 12.2ZF | 12.2(13)ZF Vulnerable. Migrate to |\n| | 12.3(4)T |\n+----------+-------------------------------------+\n| 12.2ZG | 12.2(13)ZG Vulnerable. Migrate to |\n| | 12.3(4)T |\n+----------+-------------------------------------+\n| 12.2ZH | 12.2(13)ZH Vulnerable. Migrate to |\n| | 12.3(4)T |\n+----------+-------------------------------------+\n| 12.2ZI | 12.2(11)ZI Vulnerable. Migrate to |\n| | 12.2(18)S |\n+----------+-------------+---------+-------------+\n| 12.2ZJ | 12.2(15)ZJ5 | | |\n| +-------------+---------+-------------+\n| | 12.2(15)ZJ4 | | |\n+----------+-------------+---------+-------------+\n| 12.2ZK | 12.2(15)ZK Vulnerable. Migrate to |\n| | 12.3T |\n+----------+-------------------------------------+\n| 12.2ZL | 12.2(15)ZL Vulnerable. Migrate to |\n| | 12.3(7)T |\n+----------+-------------------------------------+\n| 12.2ZN | 12.2(15)ZN Vulnerable. Migrate to |\n| | 12.3(2)T |\n+----------+-------------+---------+-------------+\n| 12.2ZP | 12.2(13)ZP3 | | |\n+----------+-------------+---------+-------------+\n| Affected | Rebuild | Interim | Maintenance |\n| 12.3 | | ** | |\n| -Based | | | |\n| Release | | | |\n+----------+-------------+---------+-------------+\n| 12.3 | 12.3(3e) | | |\n| +-------------+---------+-------------+\n| | 12.3(6) | | |\n| +-------------+---------+-------------+\n| | 12.3(5b) | | |\n+----------+-------------+---------+-------------+\n| 12.3B | 12.3(5a)B | | |\n| +-------------+---------+-------------+\n| | 12.3(3)B1 | | |\n+----------+-------------+---------+-------------+\n| 12.3BW | 12.3(1a)BW Vulnerable. Migrate to |\n| | 12.3B |\n+----------+-------------+---------+-------------+\n| 12.3T | 12.3(2)T4 | | |\n| +-------------+---------+-------------+\n| | 12.3(7)T1 Not built - contact TAC |\n| +-------------+---------+-------------+\n| | 12.3(4)T3 | | |\n+----------+-------------+---------+-------------+\n| 12.3XA | 12.3(2)XA Vulnerable. Contact TAC. |\n+----------+-------------+---------+-------------+\n| 12.3XB | 12.3(2)XB2 | | |\n+----------+-------------+---------+-------------+\n| 12.3XC | 12.3(2)XC2 | | |\n+----------+-------------+---------+-------------+\n| 12.3XD | 12.3(4)XD1 | | |\n+----------+-------------+---------+-------------+\n| 12.3XE | 12.3(2)XE Vulnerable. Migrate to |\n| | 12.3T |\n+----------+-------------------------------------+\n| 12.3XF | 12.3(2)XF Vulnerable. Contact TAC |\n| | if needed. |\n+----------+-------------+---------+-------------+\n| 12.3XG | 12.3(4)XG | | |\n+----------+-------------+---------+-------------+\n| 12.3XH | 12.3(4)XH | | |\n+----------+-------------+---------+-------------+\n| 12.3XI | 12.3(7)XI Vulnerable. Migrate to |\n| | 12.3T |\n+----------+-------------------------------------+\n| 12.3XJ | 12.3(7)XJ Vulnerable. Contact TAC |\n| | if needed |\n+----------+-------------+---------+-------------+\n| 12.3XK | 12.3(4)XK | | |\n+----------+-------------+---------+-------------+\n| 12.3XL | 12.3(7)XL Vulnerable. Contact Tac |\n| | if needed |\n+----------+-------------------------------------+\n| 12.3XM | 12.3(9)XM Vulnerable. Contact TAC |\n| | if needed. |\n+----------+-------------------------------------+\n| 12.3XN | 12.3(4)XN Vulnerable. Contact TAC |\n| | if needed. |\n+----------+-------------------------------------+\n| 12.3XQ | 12.3(4)XQ Vulnerable. Contact TAC |\n| | if needed. |\n+----------+-------------------------------------+\n| * All dates are estimated and subject to |\n| change. |\n| |\n| ** Interim releases are subjected to less |\n| rigorous testing than regular maintenance |\n| releases, and may have serious bugs. |\n+------------------------------------------------+\n\nObtaining Fixed Software\n========================\nCustomers with Service Contracts\n\nCustomers with contracts should obtain upgraded software through their\nregular update channels. For most customers, this means that upgrades\nshould be obtained through the Software Center on Cisco's worldwide\nwebsite at http://www.cisco.com. \n\nCustomers using Third-party Support Organizations\n\nCustomers whose Cisco products are provided or maintained through prior\nor existing agreement with third-party support organizations such as\nCisco Partners, authorized resellers, or service providers should contact\nthat support organization for assistance with the upgrade, which should\nbe free of charge. \n\nCustomers without Service Contracts\n\nCustomers who purchase direct from Cisco but who do not hold a Cisco\nservice contract and customers who purchase through third-party vendors\nbut are unsuccessful at obtaining fixed software through their point of\nsale should get their upgrades by contacting the Cisco Technical\nAssistance Center (TAC). TAC contacts are as follows. \n \n \n * +1 800 553 2447 (toll free from within North America)\n \n * +1 408 526 7209 (toll call from anywhere in the world)\n \n * e-mail: tac@cisco.com\n \n\nSee http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for\nadditional TAC contact information, including special localized telephone\nnumbers and instructions and e-mail addresses for use in various\nlanguages. \n\nPlease have your product serial number available and give the URL of this\nnotice as evidence of your entitlement to a free upgrade. Free upgrades\nfor non-contract customers must be requested through the TAC. \n\nPlease do not contact either \"psirt@cisco.com\" or\n\"security-alert@cisco.com\" for software upgrades. \n\nWorkarounds\n===========\nThe effectiveness of any workaround is dependent on specific customer\nsituations such as product mix, network topology, traffic behavior, and\norganizational mission. Due to the variety of affected products and\nreleases, customers should consult with their service provider or support\norganization to ensure any applied workaround is the most appropriate for\nuse in the intended network before it is deployed. \n\nThere are no workarounds available to mitigate the effects of this\nvulnerability on Cisco IOS Firewall. \n\nFor BGP, we will present the workaround and only a few mitigation\ntechniques. For additional information regarding BGP security risk\nassessment, mitigation techniques, and deployment best practices, please\nconsult ftp://ftp-eng.cisco.com/cons/isp/security/\nBGP-Risk-Assesment-v.pdf. \n \n \n * BGP MD5 secret\n \n The workaround for BGP is to configure MD5 secret for each session\n between peers. This can be configured as shown in the following\n example:\n router(config)#router bgp <AS-_number>\n router(config-router)#neighbor <IP_address> password <enter_your_secret_here>\n \n It is necessary to configure the same shared MD5 secret on both peers\n and at the same time. Failure to do so will break the existing BGP\n session and the new session will not get established until the exact\n same secret is configured on both devices. For a detailed discussion\n on how to configure BGP, refer to the following document \n http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/\n products_configuration_guide_chapter09186a00800ca571.html . Once the\n secret is configured, it is prudent to change it periodically. The\n exact period must fit within your company security policy but it\n should not be longer than a few months. When changing the secret,\n again it must be done at the same time on both devices. Failure to do\n so will break your existing BGP session. The exception is if your\n Cisco IOS software release contains the integrated CSCdx23494 ( \n registered customers only) fix. With this fix, the BGP session will\n not be terminated when the MD5 secret is changed only on one side. \n The BGP updates, however, will not be processed until either the same\n secret is configured on both devices or the secret is removed from\n both devices. \n \n\nIt is possible to mitigate the exposure for BGP on this vulnerability by\napplying one or more of the following measures which will lessen the\npotential for the necessary spoofing required to implement a successful\nattack:\n \n \n * Blocking access to the core infrastructure\n \n Although it is often difficult to block traffic transiting your\n network, it is possible to identify traffic which should never be\n allowed to target your infrastructure devices and block that traffic\n at the border of your network. Infrastructure access control lists\n (ACLs) are considered a network security best practice and should be\n considered as a long-term addition to good network security as well\n as a workaround for this specific vulnerability. The white paper\n entitled \"Protecting Your Core: Infrastructure Protection Access\n Control Lists\", available at http://www.cisco.com/warp/public/707/\n iacl.html, presents guidelines and recommended deployment techniques\n for infrastructure protection ACLs. Exceptions would include any\n devices which have a legitimate reason to access your infrastructure\n (for example, BGP peers, NTP sources, DNS serves, and so on). All\n other traffic must be able to traverse your network without\n terminating on any of your devices. \n \n \n * Configure anti-spoofing measures on the network edge\n In order for an adversary to use the attack vector described in this\n advisory, it must send packets with the source IP address equal to\n one of the BGP peers. You can block spoofed packets either using the\n Unicast Reverse Path Forwarding (uRPF) feature or by using access\n control lists (ACLs). \n By enabling uRPF, all spoofed packets will be dropped at the first\n device. To enable uRPF, use the following commands:\n router(config)#ip cef \n \n router(config)#ip verify unicast reverse-path\n \n Please consult http://www.cisco.com/en/US/products/sw/iosswrel/ps1835\n /products_configuration_guide_chapter09186a00800ca7d4.html and ftp://\n ftp-eng.cisco.com/cons/isp/security/URPF-ISP.pdf for further details\n on how uRPF works and how to configure it in various scenarios. This\n is especially important if you are using asymmetric routing. \n ACLs should also be deployed as close to the edge as possible. Unlike\n uRPF, you must specify the exact IP range that is permitted. \n Specifying which addresses should be blocked is not the optimal\n solution because it tends to be harder to maintain. \n \n Caution: In order for anti-spoofing measures to be effective,\n they must be deployed at least one hop away from the devices which\n are being protected. Ideally, they will be deployed at the network\n edge facing your customers. \n \n * Packet rate limiting RST packets are rate-limited in Cisco IOS\n software by default. This feature is introduced in Cisco IOS Software\n Release 10.2. In the case of a storm of RST packets, they are\n effectively limited to one packet per second. In order to be\n successful, an attacker must terminate connection with the first few\n packets. Otherwise, the attack is deemed to be impracticably long. On\n the other hand, SYN packets are not rate-limited in any way. \n Rate limiting can be accomplished either by using Committed Access\n Rate (CAR) or by Control Plane Policing (CPP). While CPP is the\n recommended approach, it is available only for Cisco IOS Software\n Releases 12.2(18)S and 12.3(4)T. It is currently supported only on\n the following routers: 1751, 2600/2600-XM, 3700, 7200, and 7500\n Series. \n\n CAR can be configured as follows:\n\n router(config)#access-list 103 deny tcp any host 10.1.1.1 established\n \n router(config)#access-list 103 permit tcp any host 10.0.0.1\n \n router(config)#interface <interface> <interface #>\n \n router(config-if)#rate-limit input access-group 103 8000 8000 8000 \n conform-action transmit exceed-action drop\n \n For details on how to configure and deploy CPP, please consult the\n following document http://www.cisco.com/en/US/products/sw/iosswrel/\n ps1838/products_white_paper09186a0080211f39.shtml\n \n\nExploitation and Public Announcements\n=====================================\nThe Cisco PSIRT is not aware of any public announcements or malicious use\nof the vulnerability described in this advisory. \n\nThe exploitation of the vulnerability with packets having RST flag set\n(reset packets) was discovered by Paul (Tony) Watson of OSVDB.org. The\nextension of the attack vector to packets with SYN flag was discovered by\nthe vendors cooperating on the resolution of this issue. \n\nStatus of This Notice: INTERIM\n==============================\nThis is a INTERIM advisory. Although Cisco cannot guarantee the accuracy of\nall statements in this advisory, all of the facts have been checked to\nthe best of our ability. Cisco does not anticipate issuing updated\nversions of this advisory unless there is some material change in the\nfacts. Should there be a significant change in the facts, Cisco may\nupdate this advisory. \n\nA stand-alone copy or Paraphrase of the text of this Security Advisory\nthat omits the distribution URL in the following section is an\nuncontrolled copy, and may lack important information or contain factual\nerrors. \n\nDistribution\n============\nThis advisory will be posted on Cisco's worldwide website at \nhttp://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml. \n\nIn addition to worldwide web posting, a text version of this notice is\nclear-signed with the Cisco PSIRT PGP key and is posted to the following\ne-mail and Usenet news recipients. \n \n \n * cust-security-announce@cisco.com\n \n * first-teams@first.org (includes CERT/CC)\n \n * bugtraq@securityfocus.com\n \n * vulnwatch@wulnwatch.org\n \n * cisco@spot.colorado.edu\n \n * cisco-nsp@puck.nether.net\n \n * full-disclosure@lists.netsys.com\n \n * comp.dcom.sys.cisco@newsgate.cisco.com\n \n\nFuture updates of this advisory, if any, will be placed on Cisco's\nworldwide website, but may or may not be actively announced on mailing\nlists or newsgroups. Users concerned about this problem are encouraged to\ncheck the above URL for any updates. \n\nRevision History\n================\n+----------+-------------+----------------+\n| Revision | 2004-Apr-20 | Initial public |\n| 1.0 | | release. |\n+----------+-------------+----------------+\n\nCisco Security Procedures\n=========================\nComplete information on reporting security vulnerabilities in Cisco\nproducts, obtaining assistance with security incidents, and registering\nto receive security information from Cisco, is available on Cisco's\nworldwide website at http://www.cisco.com/warp/public/707/\nsec_incident_response.shtml. This includes instructions for press\ninquiries regarding Cisco Security Notices. All Cisco Security Advisories\nare available at http://www.cisco.com/go/psirt. \n\n- -------------------------------------------------------------------------\n\nAll contents are Copyright \\xa9 1992-2004 Cisco Systems, Inc. All rights\nreserved. Important Notices and Privacy Statement. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.3 (Cygwin)\n\niD8DBQFAhZTpezGozzK2tZARAkKXAJ9BWwuytT7zwoOL+RkZJPebYN3W3ACfV/+K\n0Fd3MvvRlKSETCrlMGL/dZg=\n=eDSn\n-----END PGP SIGNATURE-----\n. \n\nThe nonexhaustive list of vulnerable non-IOS based Cisco products is as\nfollows:\n \n * Access Registrar\n\n * BPX, IGX, MGX WAN switches, and the Service Expansion Shelf\n\n * BR340, WGB340, AP340, AP350, BR350 Cisco/Aironet wireless products\n\n * Cache Engine 505 and 570\n\n * CallManager\n\n * Catalyst 1200, 1900, 28xx, 29xx, 3000, 3900, 4000, 5000, 6000\n\n * Cisco 8110 Broadband Network Termination Unit\n\n * Cisco Element Management Framework\n\n * Cisco Info Center\n\n * Cisco Intelligent Contact Management\n\n * Cisco MDS 9000\n\n * Cisco ONS 15190/15194 IP Transport Concentrator\n\n * Cisco ONS 15327 Metro Edge Optical Transport Platform\n\n * Cisco ONS 15454 Optical Transport Platform\n\n * Cisco ONS 15531/15532 T31 OMDS Metro WDM System\n\n * Cisco ONS 15800/15801/15808 Dense Wave Division Multiplexing Platform\n\n * Cisco ONS 15830 T30 Optical Amplification System\n\n * Cisco ONS 15831/15832 T31 DWDM System\n\n * Cisco ONS 15863 T31 Submarine WDM System\n\n * Content Router 4430 and Content Delivery Manager 4630 and 4650\n\n * Cisco Secure Intrusion Detection System (NetRanger) appliance and IDS\n Module\n\n * Cisco Secure PIX firewall\n\n * Cisco ws-x6608 and ws-x6624 IP Telephony Modules\n\n * CiscoWorks Windows\n\n * Content Engine 507, 560, 590, and 7320\n\n * CSS11000 (Arrowpoint) Content Services Switch\n\n * Hosting Solution Engine\n\n * User Registration Tool VLAN Policy Server\n\n * Cisco FastHub 300 and 400\n\n * CR-4430-B\n\n * Device Fault Manager\n\n * Internet CDN Content Engine 590 and 7320, Content Distribution\n Manager 4670, and Content Router 4450\n\n * IP Phone (all models including ATA and VG248)\n\n * IP/TV\n\n * LightStream 1010\n\n * LightStream 100 ATM Switches\n\n * LocalDirector\n\n * ME1100 series\n\n * MicroHub 1500,MicroSwitch 1538/1548\n\n * Voice Manager\n\n * RTM\n\n * SN5400 series storage routers\n\n * Switch Probe\n\n * Unity Server\n\n * VG248 Analog Phone Gateway\n\n * Traffic Director\n\n * WAN Manager \n \n\nProducts Confirmed Not Vulnerable\n=================================\nThe following products are not vulnerable:\n \n \n * Cisco VPN 3000 Series Concentrators\n \n * Cisco Firewall Services Module for Cisco Catalyst 6500 Series and\n Cisco 7600 Series (FWSM)\n \n\nDetails\n======\nTCP is the transport layer protocol designed to provide\nconnection-oriented reliable delivery of a data stream. The Cisco PSIRT\nhas analyzed multiple TCP-based protocols, as they are used within our\noffering, and we believe that this vulnerability does not have a\nsignificant impact on them. We will present our analysis for a few\nprotocols which have the potential for higher impact due to the long\nlived connections. \n\nVoice signaling H.225, H.245 (part of H.323 suite)\n- --------------------------------------------------\nH.225 and H.245 protocols are used in voice signaling. Their purpose is\nto negotiate parameters for content transfer (voice or video). The\nestablished sessions persist for the duration of a call. Any call in\nprogress is terminated when the signaling session is broken. A new\nsignaling session will be established immediately for the new call, but\nterminated calls cannot be re-established. \n\nEach call from an IP telephone or softphone will result in the creation\nof a single signaling session. It is possible that a single signaling session is\nresponsible for multiple calls, but that setup is used deeper within the\nService Provider's network. Determining all necessary parameters for\nmounting an attack is deemed a non-trivial task if the network is\ndesigned according to the current best practices. \n\nNetwork Storage (iSCSI, FCIP)\n- -----------------------------\nNetwork Storage products use two TCP-based protocols: SCSI over IP\n(iSCSI) and Fiber Channel over IP (FCIP). \n \n \n * SCSI over IP (iSCSI)\n \n iSCSI is used in a client/server environment. The client is your\n computer and it is only the client that initiates a connection. This\n connection is not shared with any other users. Terminating the session\n will not have any adverse consequences if people are using current\n drivers from Microsoft for Windows and from Cisco for Linux. These\n drivers will re-establish the session and continue transfer from the\n point where it was disconnected. Drivers from other vendors may\n behave differently. \n \n The user may notice that access to a virtual device is slightly\n slower than usual. \n \n \n * Fiber Channel over IP (FCIP)\n \n FCIP is a peer-to-peer protocol. It is used for mirroring data\n between switches. Each peer can initiate the session. Switches can,\n and should be in practice, configured in a mesh. Bringing one link\n down will cause traffic to be re-routed over other link(s). If an\n adversary can manage to terminate the session multiple times in a\n row, the user's application may terminate with a \"Device unreachable\"\n or similar error message. This does not have any influence on the\n switch itself and the user can retry the operation. \n \n The user may notice that access to a virtual device is slightly\n slower than usual. An occasional error message is possible. SSL/TLS connections can be used to encapsulate\nvarious kinds of traffic and these sessions can be long lived. An\nencrypted session can be attacked either on the originating or\nterminating host or on the firewalls in front of them (if they exist). |\n| | | Customers |\n| | | are |\n| | | encouraged |\n| | | to migrate |\n| | | to IOS. <html>\n\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=windows-1252\">\n\n<title>NISCC Vulnerability Advisory 236929</title>\n<style>\n<!--\nbody { font-family: Verdana }\n-->\n</style>\n</head>\n\n<body bgcolor=\"#FFFFCC\">\n<div class=Section1 style=\"width: 100%;\"> \n<div align=\"center\"><img src=\"http://www.niscc.gov.uk/images/newtitle.gif\" width=\"766\" height=\"80\" alt=\"National Infrastructure Security Co-Ordination Centre\"></div>\n<br>\n<font size=\"4\"><b><font color=\"#FF0000\">NISCC Vulnerability Advisory 236929</b></font><br>\n<br>\n<b>Vulnerability Issues in TCP</b></font><br>\n<br>\n<br>\n\n<b><font size=\"3\">Version</font> Information</b>\n<br><br>\n<table border=\"1\" width=\"61%\">\n <tr>\n <td width=\"58%\">Advisory Reference</td>\n <td width=\"77%\">236929</td>\n </tr>\n <tr>\n <td width=\"58%\">Release Date</td>\n <td width=\"77%\">20 April 2004</td>\n </tr>\n <tr>\n <td width=\"58%\">Last Revision</td>\n <td width=\"77%\">22 April 2004</td>\n </tr>\n <tr>\n <td width=\"58%\">Version Number</td>\n <td width=\"77%\">1.4</td>\n </tr>\n</table>\n <br><br>\n<b>What is Affected?</b><br>\n<br>\nThe vulnerability described in this advisory affects implementations of the \nTransmission Control Protocol (TCP) that comply with the Internet Engineering \nTask Force\\x92s (IETF\\x92s) Requests For Comments (RFCs) for TCP, including \n<a href=\"http://www.ietf.org/rfc/rfc0793.txt\">RFC 793</a>, the \noriginal specification, and <a href=\"http://www.ietf.org/rfc/rfc1323.txt\">RFC 1323</a>, TCP Extensions for High Performance.<br>\n<br>\nTCP is a \ncore network protocol used in the majority of networked computer systems today. \nMany vendors include support for this protocol in their products and may be \nimpacted to varying degrees. \n<br>\n<br>\n<br>\n<b>Severity</b><br>\n<br>\nThe impact of this vulnerability varies by vendor and application, but in some \ndeployment scenarios it is rated critical. Alternatively contact your vendor for product specific \ninformation.<br>\n<br>\nIf exploited, the vulnerability could allow an attacker to create a \nDenial of Service condition against existing TCP connections, resulting in \npremature session termination. The resulting session termination will affect the \napplication layer, the nature and severity of the effects being dependent on the \napplication layer protocol. The primary dependency is on the duration of the TCP \nconnection, with a further dependency on knowledge of the network (IP) addresses \nof the end points of the TCP connection.<br>\n<br>\nThe Border Gateway Protocol (BGP) is judged to be potentially most affected \nby this vulnerability.<br>\n<br>\nBGP relies on a persistent TCP session between BGP peers. Resetting the \nconnection can result in medium term unavailability due to the need to rebuild \nrouting tables and route flapping. Route flapping may result in route dampening \n(suppression) if the route flaps occur frequently within a short time interval. The overall impact on BGP is likely to be moderate based on \nthe likelihood of successful attack. If the TCP MD5 Signature Option and \nanti-spoofing measures are used \nthen the impact will be low as these measures will successfully mitigate the \nvulnerability.<br>\n<br>\nThere is a potential impact on other application protocols such as DNS (Domain \nName System) and SSL (Secure Sockets Layer) in the case of zone transfers and \necommerce transactions respectively, but the duration of the sessions is \nrelatively short and the sessions can be restarted without medium term \nunavailability problems. In the case of SSL it may be difficult to guess the \nsource IP address.<br>\n<br>\nData injection may be possible. However, this has not been demonstrated and \nappears to be problematic. The reason \nfor this is that the receiving TCP implementation checks the sequence number of \nthe RST or SYN packet, which is a 32 bit number, giving a probability of 1/2<sup><font size=\"2\">32</font></sup> of \nguessing the sequence number correctly (assuming a random distribution).<br>\n<br>\nThe discoverer of the practicability of the RST attack was Paul A. Watson, who \ndescribes his research in his paper \\x93Slipping In The Window: TCP Reset Attacks\\x94, \npresented at the CanSecWest 2004 conference. In a RST/ACK packet an acknowledgement number is included \nin the packet, although it is not checked by the receiving TCP implementation.)<br>\n<br>\n<a href=\"http://www.ietf.org/rfc/rfc0793.txt\">RFC 793</a>, p36, states the following:<br>\n<br>\n"In all states except SYN-SENT, all reset (RST) segments are validated by \nchecking their SEQ-fields [sequence numbers]. In the SYN-SENT state (a RST received in response to an \ninitial SYN), the RST is acceptable if the ACK field acknowledges the SYN."<br>\n<br>\nResets must be processed immediately. \n<a href=\"http://www.ietf.org/rfc/rfc0793.txt\">RFC 793</a>, p25, says "[\\x85] [E]ven when the \nreceive window is zero, a TCP must process the RST and URG fields of all \nincoming segments."<br>\n<br>\nIt is also possible to perform the same attack with SYN (synchronise) packets. \n<a href=\"http://www.ietf.org/rfc/rfc0793.txt\">RFC 793</a>, p31 \nstates:<br>\n<br>\n\\x93The principle reason for the three-way handshake is to prevent old duplicate \nconnection initiations from causing confusion. To deal with this, a special \ncontrol message, reset, has been devised. [\\x85] If the TCP is in one of the \nsynchronized states (ESTABLISHED, FIN-WAIT-1, FIN-WAIT-2, CLOSE-WAIT, CLOSING, \nLAST-ACK, TIME-WAIT), it aborts the connection and informs its user.\\x94<br>\n<br>\nTCP window sizes are negotiated in the initial 3-way handshake used to set up a \nTCP connection, with higher values serving to improve throughput in some \ncircumstances. Vendor-chosen defaults also influence the selection. An attacker seeking to disrupt an \nexisting TCP connection must supply the 4-tuple correctly. As the source port \nvaries, additional work is generally called for on the part of the attacker. \nHowever, research (referenced below) has shown that the process of source port \nselection on many platforms includes predictable elements, so that the attack \nremains practicable. By weighting 'likely' source port values carefully, an \nattacker can disrupt TCP implementations that employ a range of window sizes.<br>\n<br>\nApplication layer protocols that are critically affected are those that:<br>\n<br>\n<table border=\"0\" cellpadding=\"4\" cellspacing=\"0\" style=\"border-collapse: collapse\" bordercolor=\"#111111\" width=\"100%\" id=\"AutoNumber6\">\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"96%\">Depend on long lived TCP connections</td>\n </tr>\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"96%\">Have known or easy-to-guess IP address end points</td>\n </tr>\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"96%\">Have easy to an easy-to-guess source TCP port</td>\n </tr>\n</table>\n<p>As noted above BGP does use long lived TCP connections, and the IP addresses and \nsource port (and destination port) are sometimes available through the use of \nBGP looking glasses (multi-source, multi-destination trace route tools) or DNS \nresource records. Using \\x93trace route\\x94 commands can provide information on \npeering point IP addresses. Thus BGP is likely to be critically affected by the \nTCP vulnerability.<br>\n<br>\nThese denial of service attacks can be carried out by single machine, or by \nmultiple co-operating systems (to form a distributed denial of service attack).<br>\n<br>\nIt is also possible to inject packets, which will be processed if they are in \nthe window. The difficulty with data injection attacks is that the receiving TCP \nimplementation will reassemble the packets received according to sequence \nnumber, dropping any duplicate packets.<br>\n<br>\n<br>\nVendor specific information will be released as it becomes available and if vendor permission has been received. Subscribers are advised to check the following URL regularly for updates:<br>\n<br>\n<a href=\"http://www.uniras.gov.uk/vuls/2004/236929/index.htm\">http://www.uniras.gov.uk/vuls/2004/236929/index.htm</a><br>\n<br>\n<i>[Please note that updates to this advisory will not be notified by email.]</i><br>\n<br>\nThis vulnerability has been assigned the <a href=\"http://cve.mitre.org/cve\">CVE</a> \nname \n<a href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0230\">CAN-2004-0230</a>.<br>\n<br>\nThe <a href=\"http://www.osvdb.org\">Open Source Vulnerability Database</a> ID \nnumber for this vulnerability is\n<a href=\"http://www.osvdb.org/displayvuln.php?osvdb_id=4030\">4030</a>.<br>\n<br>\n<br>\n<b>Mitigation</b><br>\n<br>\nThe following mitigation steps are still being evaluated and may be incomplete. \nCustomers should work with vendors for the workaround most appropriate for the \nproduct in question.<br>\n<br>\nIn the absence of vendor patching of the TCP implementation, the following are \ngeneral mitigating steps:<br>\n<br>\n<table border=\"0\" cellpadding=\"4\" cellspacing=\"0\" style=\"border-collapse: collapse\" bordercolor=\"#111111\" width=\"100%\" id=\"AutoNumber4\">\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"97%\">Implement IP Security (IPSEC) which will encrypt traffic at the network layer, \nso TCP information will not be visible</td>\n </tr>\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"97%\">Reduce the TCP window size (although this could increase \n traffic loss and subsequent retransmission)</td>\n </tr>\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"97%\">Do not publish TCP source port information</td>\n </tr>\n</table>\n<p>It should be noted that IPSEC provides confidentiality and authentication \nservices at the network layer, and can provide a measure of trust in the \nauthenticity of the end points as well as encryption of traffic between the end \npoints. However, in the context of the current attack IPSEC will reject \nRST and SYN packets that are not part of a secure IP packet stream.<br>\n<br>\nTo change the TCP window size, in some Unix variants you can set a value of the \ndefault TCP windows size by using the \\x93sysctl\\x94 program (\\x93ndd -set\\x94 in the case \nof Sun Solaris). In the case of Microsoft Windows NT/2000/XP/2003, the default \nwindow size can be changed by modifying the value of the HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters \nkey. As noted above, great care should be exercised when altering the default \nTCP window size as network performance could be adversely affected.<br>\n<br>\nIn the case of BGP, the following may counter the problem:<br>\n<br>\n<table border=\"0\" cellpadding=\"4\" cellspacing=\"0\" style=\"border-collapse: collapse\" bordercolor=\"#111111\" width=\"100%\" id=\"AutoNumber5\">\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"96%\">Implement ingress and egress filtering to check that the \n traffic entering or leaving the network has a source IP address that is \n expected on the router/firewall interface that receives the traffic</td>\n </tr>\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"96%\">Implement the TCP MD5 Signature Option to checksum the TCP \n packet carrying the BGP application data (see <a href=\"http://www.ietf.org/rfc/rfc2385.txt\">RFC 2385</a>), \nbeing careful to set and maintain strong (i.e. difficult to guess) passwords to \nwhich the MD5 checksum is applied. Also see\n <a href=\"http://www.ietf.org/rfc/rfc3562.txt\">RFC 3562</a> which discusses \n the security requirements of this keying material.</td>\n </tr>\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"96%\">Limit the amount of information available through looking \n glasses and DNS resource records, being careful not to expose TCP port \n information unnecessarily</td>\n </tr>\n</table>\n<p>\nThe IETF ingress filtering standard is defined in \n<a href=\"http://www.ietf.org/rfc/rfc2827.txt\">RFC 2827</a>. \nA discussion of egress filtering can be found at \n<a href=\"http://www.sans.org/y2k/egress.htm\">http://www.sans.org/y2k/egress.htm</a>.<br>\n<br>\nThe use of the TCP MD5 Signature Option will prevent the exploitation of this \nvulnerability. Router customers should implement this on all BGP peering points \nif it is supported by the router, upgrading the router firmware if necessary.<br>\n<br>\n<br>\n<b>Solution</b><br>\n<br>\nPlease refer to the Vendor Information section of this advisory for \nimplementation specific remediation.<br>\n<br>\nSome vendors will have reduced the \nlikelihood of successful denial of service by amending the TCP implementation to \nissue a further acknowledgment packet challenge for RST and SYN packets that do \nnot have exactly the expected sequence number.<br>\n<br>\n<a href=\"http://www.ietf.org\">The Internet Engineering Task Force</a> (IETF) has \npublished an Internet Draft to co-incide \nwith the release of this advisory. \nThe text of this draft is available from \nthe IETF web site:<br>\n<a href=\"http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt\">http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt</a><br>\n<br>\nNISCC has produced best practice guidelines for BGP available at<br>\n<a href=\"http://www.niscc.gov.uk/BGP%20Filtering%20Guide.pdf\">http://www.niscc.gov.uk/BGP Filtering Guide.pdf</a><br>\n<br>\nSecure configuration templates for BGP implementations on Cisco IOS and Juniper JUNOS can be found at:<br>\n<br>\n<table border=\"0\" cellpadding=\"4\" cellspacing=\"1\" style=\"border-collapse: collapse\" bordercolor=\"#111111\" width=\"100%\" id=\"AutoNumber2\">\n <tr>\n <td width=\"3%\">\\x95 </td>\n <td width=\"11%\">Cisco\n </td>\n <td width=\"99%\"><a href=\"http://www.cymru.com/Documents/secure-bgp-template.html\">http://www.cymru.com/Documents/secure-bgp-template.html\n</a></td>\n </tr>\n <tr>\n <td width=\"3%\">\\x95 </td>\n <td width=\"11%\">Juniper </td>\n <td width=\"99%\">\n<a href=\"http://www.qorbit.net/documents/junos-bgp-template.pdf\">http://www.qorbit.net/documents/junos-bgp-template.pdf\n</a>\n </td>\n </tr>\n</table>\n<p>\nGuidance on tuning of the IP stack for a number of different UNIX operating systems is available at \n<a href=\"http://www.cymru.com/Documents/ip-stack-tuning.html\">http://www.cymru.com/Documents/ip-stack-tuning.html\n</a>\n<br>\n<br>\n<br>\n\n<B>Vendor Information</B>\n<br>\n<br>\nThe following vendors have provided information about how their products are affected\nby these vulnerabilities.<br>\n<br>\n<i><font size=\"2\">Please note that <a href=\"http://www.jpcert.or.jp\">JPCERT/CC</a> have released a Japanese language advisory for this vulnerability\n which contains additional information regarding Japanese vendors. This advisory is available at\n <a href=\"http://www.jpcert.or.jp/at/2004/at040003.txt\">http://www.jpcert.or.jp/at/2004/at040003.txt</a>.</font></i><br>\n<br>\n</p>\n</p>\n</p>\n<table border=\"0\" cellpadding=\"0\" cellspacing=\"0\" style=\"border-collapse: collapse\" bordercolor=\"#111111\" width=\"100%\" id=\"AutoNumber1\">\n <tr>\n <td width=\"33%\"><font size=\"2\"><a href=\"#certicom\">Certicom</a></font></td>\n <td width=\"33%\"><font size=\"2\"><a href=\"#iij\">Internet Initiative Japan, Inc</a></font></td>\n <td width=\"34%\"><font size=\"2\"><a href=\"#nec\">NEC</a></font></td>\n </tr>\n <tr>\n <td width=\"33%\"><font size=\"2\"><a href=\"#checkpoint\">Check Point</a></font></td>\n <td width=\"33%\"><font size=\"2\"><a href=\"#interniche\">InterNiche</a></font></td>\n <td width=\"34%\"><font size=\"2\"><a href=\"#nortel\">Nortel</a></font></td>\n </tr>\n <tr>\n <td width=\"33%\"><font size=\"2\"><a href=\"#cisco\">Cisco</a></font></td>\n <td width=\"33%\"><font size=\"2\"><a href=\"#juniper\">Juniper Networks</a></font></td>\n <td width=\"34%\"><font size=\"2\"><a href=\"#polycom\">Polycom</a></font></td>\n </tr>\n <tr>\n <td width=\"33%\"><font size=\"2\"><a href=\"#cray\">Cray Inc</a></font></td>\n <td width=\"33%\"><font size=\"2\"><a href=\"#lucent\">Lucent Technologies</a></font></td>\n <td width=\"34%\"><font size=\"2\"><a href=\"#seccomp\">Secure Computing Corporation</a></font></td>\n </tr>\n <tr>\n <td width=\"33%\"><font size=\"2\"><a href=\"#hitachi\">Hitachi</a></font></td>\n <td width=\"33%\"><font size=\"2\"><a href=\"#mitel\">Mitel Networks</a></font></td>\n <td width=\"34%\"><font size=\"2\"><a href=\"#yamaha\">Yamaha</a></font></td>\n </tr>\n <tr>\n <td width=\"33%\"><font size=\"2\"><a href=\"#innovaphone\">Innovaphone</a></font></td>\n <td width=\"33%\"><font size=\"2\"><a href=\"#mrlg\">MRLG</a></font></td>\n <td width=\"34%\"> </td>\n </tr>\n </table>\n</p>\n\n<br>\n<table border=\"0\" width=\"100%\" cellpadding=\"8\" cellspacing=\"0\">\n\n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFbe\">\n <u><a name=\"certicom\"></a>Certicom</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFbe\">\n </td>\n <td width=\"97%\" bgcolor=\"#FFFFbe\">\n Certicom has examined the National Infrastructure Security Coordination \n Centre (NISCC) advisory and determined it is not vulnerable.<br>\n <br>Certicom \n Developer Toolkits for SSL (SSL Plus, SSL Plus for Java, Security Builder \n SSL-C and Security Builder SSL-J) do not provide a TCP/IP transport \n mechanism, but rather utilize the supported operating system's TCP/IP stack. \n The vulnerability is against the TCP/IP stack itself, and not directly \n against the functionality offered by Certicom toolkits. Therefore, there is \n no patch or workaround that can be implemented within Certicom products. The \n patch or workaround must be provided by the operating system vendor.<br>\n <br>\n Customers are urged to contact their operating system vendors to determine \n if they have provided a workaround to this advisory. If you have any further \n questions please do not hesitate to contact\n <a href=\"mailto:support@certicom.com\">support@certicom.com</a>.</td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFaf\"><u><a name=\"checkpoint\"></a>\n Check Point</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFaf\"> </td>\n <td width=\"97%\" bgcolor=\"#FFFFaf\">The latest release for VPN-1/FireWall-1 \n (R55 HFA-03) contains a protection against this vulnerability. The \n protection applies to both the firewall device and to hosts behind the \n firewall.<br>\n <br>\n Please refer to the Check Point web site for further information at:<br>\n <a HREF=\"http://www.checkpoint.com/techsupport/alerts/tcp_dos.html\">\n http://www.checkpoint.com/techsupport/alerts/tcp_dos.html</a>.</td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFbe\">\n <u><a name=\"cisco\"></a>Cisco</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFbe\">\n </td>\n <td width=\"97%\" bgcolor=\"#FFFFbe\">\n Cisco Systems is addressing the vulnerabilities identified by NISCC \n Vulnerability Advisory 236929 across its entire product line. Cisco \n has released two related advisories:<br>\n <br>\n TCP Vulnerabilities in Multiple IOS-Based Cisco Products<br>\n <a href=\"http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml\">http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml</a><br>\n <br>\n TCP Vulnerabilities in Multiple Non-IOS Cisco Products<br>\n <a href=\"http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml\">http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml</a></td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFaf\">\n <u><a name=\"cray\"></a>Cray Inc</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFaf\"> </td>\n <td width=\"97%\" bgcolor=\"#FFFFaf\">Cray Inc. is vulnerable on their UNICOS, \n UNICOS/mk and UNICOS/mp systems. Spr's have been opened to track this \n issue. Please contact your local Cray Service Representative for more \n information.</td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFbe\">\n <u><a name=\"hitachi\"></a>Hitachi</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFbe\">\n </td>\n <td width=\"97%\" bgcolor=\"#FFFFbe\">\n Hitachi is investigating the potential impact to Hitachi's products.</td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFaf\">\n <u><a name=\"innovaphone\"></a>Innovaphone</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFaf\"> </td>\n <td width=\"97%\" bgcolor=\"#FFFFaf\">\n Not vulnerable.</td>\n </tr>\n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFbe\">\n <u><a name=\"iij\"></a>Internet Initiative Japan, Inc (IIJ)</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFbe\">\n </td>\n <td width=\"97%\" bgcolor=\"#FFFFbe\">\n IIJ will release a new firmware to fix this vulnerability. Details are \n available on their web site at\n <a href=\"http://www.seil.jp/en/ann/announce_en_20040421_01.txt\">\n http://www.seil.jp/en/ann/announce_en_20040421_01.txt</a>.</td>\n </tr>\n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFaf\">\n <u><a name=\"interniche\"></a>InterNiche</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFaf\"> </td>\n <td width=\"97%\" bgcolor=\"#FFFFaf\">=== NicheStack v2.0 TCP/IP ===<br>\n <br>\n InterNiche Technologies has updated its \n NicheStack v2.0 TCP/IP product to handle the scenarios described in NISCC \n Vulnerability Notice #236929. \n The patch is available to all InterNiche customers in accordance with the \n terms of their current support agreements.<br>\n <br>\n More information can be found on <a href=\"http://www.iNiche.com\">www.iNiche.com</a> or through \n <a href=\"mailto:support@iNiche.com\">support@iNiche.com</a>\n <br><br><br>\n === NicheLite v2.0 TCP/IP ===<br>\n <br>\n InterNiche Technologies has updated its \n NicheLite v2.0 TCP/IP product to handle the scenarios described in NISCC \n Vulnerability Notice #236929. \n The patch is available to all InterNiche customers in accordance with the \n terms of their current support agreements. <br>\n <br>\n More information can be found on <a href=\"http://www.iNiche.com\">www.iNiche.com</a> or through \n <a href=\"mailto:support@iNiche.com\">support@iNiche.com</a> </td>\n </tr>\n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFbe\">\n <u><a name=\"juniper\"></a>\n Juniper Networks</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFbe\">\n </td>\n <td width=\"97%\" bgcolor=\"#FFFFbe\">\n Juniper Networks products are susceptible to this vulnerability. Customers\n should contact Juniper Networks Technical Assistance Center for availability and\n download instructions.<br>\n <br>Additional information is posted on our web site at\n <a href=\"https://www.juniper.net/support\">https://www.juniper.net/support</a>. </td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFaf\">\n <u><a name=\"lucent\"></a>Lucent Technologies</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFaf\"> </td>\n <td width=\"97%\" bgcolor=\"#FFFFaf\">Lucent Technologies is aware of this \n vulnerability advisory and is investigating any potential impact to its \n product portfolio. As further information becomes available, Lucent will \n provide information directly to its customers, if appropriate.</td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFbe\">\n <u><a name=\"mitel\"></a>Mitel Networks</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFbe\">\n </td>\n <td width=\"97%\" bgcolor=\"#FFFFbe\">\n Mitel is aware of the vulnerability and is \n working with the vendors of our underlying networking software to assess the \n impact and, if necessary, determine potential solutions. When more \n information becomes available, an advisory will be issued. Please contact '<a href=\"mailto:security@mitel.com\">security@mitel.com</a>' \n if you have specific questions.</td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFaf\">\n <u><a name=\"mrlg\"></a>MRLG</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFaf\"> </td>\n <td width=\"97%\" bgcolor=\"#FFFFaf\">A new version of the Multi-Router Looking Glass tool (4.3.0) has been released. \n This includes a patch that prevents a remote user from utilising the "sh ip \n bgp neighbors" functionality. This new version is available from\n <a href=\"ftp://ftp.enterzone.net/looking-glass/CURRENT/\">\n ftp://ftp.enterzone.net/looking-glass/CURRENT/</a>. </td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFbe\">\n <u><a name=\"nec\"></a>NEC</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFbe\">\n </td>\n <td width=\"97%\" bgcolor=\"#FFFFbe\">\n NEC is aware of this vulnerability and is trying to determine potential \n impacts on our products.</td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFaf\">\n <u><a name=\"nortel\"></a>Nortel Networks</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFaf\"> </td>\n <td width=\"97%\" bgcolor=\"#FFFFaf\">Nortel Networks has evaluated this issue and testing has confirmed that it \n is possible to successfully exploit this vulnerability. However, the \n preconditions for a successful exploitation require levels of access to the \n network that are unlikely to be achieved in a normal network operating \n environment; furthermore, such levels of access would enable other forms of \n attack with much greater impact than that achievable by exploiting this \n vulnerability.<br>\n <br>\n Nortel Networks is continuing to validate that this \n vulnerability has no serious consequences for Nortel equipment, and will \n update this statement periodically.</td>\n </tr>\n\n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFbe\">\n <u><a name=\"polycom\"></a>Polycom</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFbe\">\n </td>\n <td width=\"97%\" bgcolor=\"#FFFFbe\">\n Polycom has investigated the potential \n impact to our products for NISCC Advisory 236929.<br>\n <br>\n Specific product information will be provided at\n <a HREF=\"http://www.polycom.com/securitycenter\">\n http://www.polycom.com/securitycenter</a>.</td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFaf\">\n <u><a name=\"seccomp\"></a>Secure Computing Corporation</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFaf\"> </td>\n <td width=\"97%\" bgcolor=\"#FFFFaf\">The Sidewinder and Sidewinder G2 firewalls offer protection against this \n attack at all releases. As application-layer firewalls, Sidewinder and \n Sidewinder G2 offer protection to systems behind the firewall as well as \n protecting management connections to the firewall.</td>\n </tr>\n \n <tr>\n <td width=\"100%\" colspan=\"2\" bgcolor=\"#FFFFbe\">\n <u><a name=\"yamaha\"></a>Yamaha</u></td>\n </tr>\n <tr>\n <td width=\"3%\" bgcolor=\"#FFFFbe\">\n </td>\n <td width=\"97%\" bgcolor=\"#FFFFbe\">\n Pending.</td>\n </tr>\n \n </table>\n<br>\n<br>\n<b>Acknowledgements</b><br>\n<br>\nNISCC wishes to thank the following:<br>\n<br>\n<table border=\"0\" cellpadding=\"6\" style=\"border-collapse: collapse\" bordercolor=\"#111111\" width=\"100%\" id=\"AutoNumber3\">\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"197%\">Steve Bellovin, Rob Thomas and Paul Watson for their \n contributions to this advisory.</td>\n </tr>\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"197%\">Cisco Systems Inc. and Juniper Networks Inc. for their help \n with the content of this advisory and for their support during the \n disclosure process.</td>\n </tr>\n <tr>\n <td width=\"3%\" align=\"left\" valign=\"top\">\\x95 </td>\n <td width=\"197%\">JPCERT/CC for their assistance in co-ordinating this disclosure \n in Japan.</td>\n </tr>\n</table>\n<br>\n<br>\n<b>References</b>\n<br>\n<table border=\"0\" cellpadding=\"4\" cellspacing=\"0\" style=\"border-collapse: collapse\" bordercolor=\"#111111\" width=\"100%\" id=\"AutoNumber7\">\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"98%\" colspan=\"3\"><b>Internet Engineering Task Force</b></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">RFC 793 Transmission Control Protocol</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\"><a href=\"http://www.ietf.org/rfc/rfc793.txt\">\n http://www.ietf.org/rfc/rfc793.txt</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">RFC 1323 TCP Extensions for High Performance</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\"><a href=\"http://www.ietf.org/rfc/rfc1323.txt\">\n http://www.ietf.org/rfc/rfc1323.txt</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">RFC 1771 A Border Gateway Protocol 4 (BGP-4)</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\"><a href=\"http://www.ietf.org/rfc/rfc1771.txt\">\n http://www.ietf.org/rfc/rfc1771.txt</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">RFC 2385 Protection of BGP Sessions via the TCP \n MD5 Signature Option</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\"><a href=\"http://www.ietf.org/rfc/rfc2385.txt\">\n http://www.ietf.org/rfc/rfc2385.txt</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">RFC 2827 Network Ingress Filtering</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\"><a href=\"http://www.ietf.org/rfc/rfc2827.txt\">\n http://www.ietf.org/rfc/rfc2827.txt</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">RFC 3562 Considerations for the TCP MD5 \n Signature Option</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\"><a href=\"http://www.ietf.org/rfc/rfc3562.txt\">\n http://www.ietf.org/rfc/rfc3562.txt</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">RFC 3682 Generalized TTL Security Mechanism</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\"><a href=\"http://www.ietf.org/rfc/rfc3682.txt\">\n http://www.ietf.org/rfc/rfc3682.txt</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">Internet Draft - Transmission Control Protocol \n security considerations</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\">\n <a href=\"http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt\">\n http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"98%\" colspan=\"3\"><b>NISCC</b></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">Best Practice Guidelines - Border Gateway \n Protocol</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\">\n <a href=\"http://www.niscc.gov.uk/BGP%20Filtering%20Guide.pdf\">\n http://www.niscc.gov.uk/BGP Filtering Guide.pdf</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"98%\" colspan=\"3\"><b>Configuration and Tuning Guides</b></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">Secure BGP Template for Cisco IOS</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\">\n <a href=\"http://www.cymru.com/Documents/secure-bgp-template.html\">\n http://www.cymru.com/Documents/secure-bgp-template.html</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">JUNOS Secure BGP Template</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\">\n <a href=\"http://www.qorbit.net/documents/junos-bgp-template.pdf\">\n http://www.qorbit.net/documents/junos-bgp-template.pdf</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">UNIX IP Stack Tuning Guide</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\">\n <a href=\"http://www.cymru.com/Documents/ip-stack-tuning.html\">\n http://www.cymru.com/Documents/ip-stack-tuning.html</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"98%\" colspan=\"3\"><b>Other Documents</b></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">SANS discussion on egress filtering</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\"><a href=\"http://www.sans.org/y2k/egress.htm\">\n http://www.sans.org/y2k/egress.htm</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"98%\" colspan=\"3\"><b>Vulnerability Databases</b></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">Common Vulnerabilities and Exposures (CVE)</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\">\n <a href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0230\">\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0230</a></td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"96%\" colspan=\"2\">Open Source Vulnerability Database (OSVDB)</td>\n </tr>\n <tr>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"2%\"> </td>\n <td width=\"94%\">\n <a href=\"http://www.osvdb.org/displayvuln.php?osvdb_id=4030\">\n http://www.osvdb.org/displayvuln.php?osvdb_id=4030</a></td>\n </tr>\n</table>\n<p>\n<br>\n<br>\n<b>Contact Information</b><br>\n<br>\nThe NISCC Vulnerability Management Team can be contacted as follows:<br>\n\n</p>\n\n</p>\n\n<table border=\"1\" width=\"87%\" cellspacing=\"3\" cellpadding=\"5\">\n <tr>\n <td width=\"30%\" valign=\"top\">Email</td>\n <td width=\"70%\"><a href=\"mailto:vulteam@niscc.gov.uk\">vulteam@niscc.gov.uk</a>\n <br><i>(Please quote the advisory reference in the subject line.)</i></td>\n </tr>\n <tr>\n <td width=\"30%\" valign=\"top\">Telephone</td>\n <td width=\"70%\"> +44 (0)20 7821 1330 Extension 4511\n <br><i>(Monday to Friday 08:30 - 17:00)</i></td>\n </tr>\n <tr>\n <td width=\"30%\" valign=\"top\">Fax</td>\n <td width=\"70%\"> +44 (0)20 7821 1686</td>\n </tr>\n <tr>\n <td width=\"30%\" valign=\"top\">Post</td>\n <td width=\"70%\"> Vulnerability Management Team<br>\n NISCC<br>\n PO Box 832<br>\n London<br>\n SW1P 1BG</td>\n </tr>\n</table>\n\n<br>\nWe encourage those who wish to communicate via email to make use of our PGP key. This is available from <a href=\"http://www.uniras.gov.uk/UNIRAS.asc\">http://www.uniras.gov.uk/UNIRAS.asc</a>.<br>\n<br>\nPlease note that UK government protectively marked material should not be sent to the email address above.<br>\n<br>\nIf you wish to be added to our email distribution list, please email your request to <a href=\"mailto:uniras@niscc.gov.uk\">uniras@niscc.gov.uk</a>.<br>\n\n\n\n<br>\n<br>\n<b>\nWhat is NISCC?</b><br>\n<br>\nFor further information regarding the UK National Infrastructure Security Co-Ordination Centre, please visit the NISCC web site at:\n<br>\n<a href=\"http://www.niscc.gov.uk/aboutniscc/index.htm\">http://www.niscc.gov.uk/aboutniscc/index.htm</a><br>\n<br>\nReference to any specific commercial product, process or service by trade name, trademark manufacturer or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by NISCC. The views and opinions of authors expressed within this notice shall not be used for advertising\nor product endorsement purposes.<br>\n<br>\nNeither shall NISCC accept responsibility for any errors or omissions contained within this advisory. In particular, they shall not be liable for any loss or damage whatsoever, arising from or in connection with the usage of information contained within this notice.<br>\n<br>\n\\xa9 2004 Crown Copyright<br>\n<br>\nRevision History<br>\n<br>\n<table border=\"0\" width=\"100%\">\n <tr>\n <td width=\"23%\">\n<font size=\"2\">April 20</font><SMALL>, 2004:\n</SMALL>\n </td>\n <td width=\"77%\">\n<SMALL>\n Initial release (1.0)</SMALL></td>\n </tr>\n \n <tr>\n <td width=\"23%\">\n<font size=\"2\">April 21, 2004:</font></td>\n <td width=\"77%\">\n<font size=\"2\">Corrected hyperlinks (1.1)</font></td>\n </tr>\n \n <tr>\n <td width=\"23%\">\n </td>\n <td width=\"77%\">\n<font size=\"2\">Inserted impact statement for Cisco (1.1)</font></td>\n </tr>\n \n <tr>\n <td width=\"23%\">\n </td>\n <td width=\"77%\">\n<font size=\"2\">Inserted impact statement for Mitel (1.1)</font></td>\n </tr>\n \n <tr>\n <td width=\"23%\">\n </td>\n <td width=\"77%\">\n<font size=\"2\">Inserted MRLG patch reference (1.2)</font></td>\n </tr>\n \n <tr>\n <td width=\"23%\">\n<font size=\"2\">April 22, 2004:</font></td>\n <td width=\"77%\">\n<font size=\"2\">Revised impact statement for Certicom (1.3)</font></td>\n </tr>\n \n <tr>\n <td width=\"23%\">\n </td>\n <td width=\"77%\">\n<font size=\"2\">Inserted impact statement for Nortel Networks (1.3)</font></td>\n </tr>\n \n <tr>\n <td width=\"23%\">\n </td>\n <td width=\"77%\">\n<font size=\"2\">Inserted impact statement for Secure Computing Corporation (1.3)</font></td>\n </tr>\n \n <tr>\n <td width=\"23%\">\n </td>\n <td width=\"77%\">\n<font size=\"2\">Inserted references section (1.4)</font></td>\n </tr>\n \n <tr>\n <td width=\"23%\">\n </td>\n <td width=\"77%\">\n<font size=\"2\">Inserted impact statement for Lucent Technologies (1.4)</font></td>\n </tr>\n \n </table>\n\n\n\n<br>\n<End of NISCC Vulnerability Advisory><br>\n</div>\n</body>\n\n</html>. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-14:19.tcp Security Advisory\n The FreeBSD Project\n\nTopic: Denial of Service in TCP packet processing\n\nCategory: core\nModule: inet\nAnnounced: 2014-09-16\nCredits: Jonathan Looney (Juniper SIRT)\nAffects: All supported versions of FreeBSD. \nCorrected: 2014-09-16 09:48:35UTC (stable/10, 10.1-PRERELEASE)\n 2014-09-16 09:48:35 UTC (stable/10, 10.1-BETA1-p1)\n 2014-09-16 09:50:19 UTC (releng/10.0, 10.0-RELEASE-p9)\n 2014-09-16 09:49:11 UTC (stable/9, 9.3-STABLE)\n 2014-09-16 09:50:19 UTC (releng/9.3, 9.3-RELEASE-p2)\n 2014-09-16 09:50:19 UTC (releng/9.2, 9.2-RELEASE-p12)\n 2014-09-16 09:50:19 UTC (releng/9.1, 9.1-RELEASE-p19)\n 2014-09-16 09:49:11 UTC (stable/8, 8.4-STABLE)\n 2014-09-16 09:50:19 UTC (releng/8.4, 8.4-RELEASE-p16)\nCVE Name: CVE-2004-0230\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit <URL:http://security.FreeBSD.org/>. New TCP connections are initiated using special SYN\nflag in a datagram. Sequencing of data is controlled by 32-bit sequence\nnumbers, that start with a random value and are increased using modulo\n2**32 arithmetic. In case one of the two port numbers is unknown, a successful\nattack requires less than 2**17 packets spoofed, which can be\ngenerated within less than a second on a decent connection to the\nInternet. Workaround\n\nIt is possible to defend against these attacks with stateful traffic\ninspection using a firewall. This can be done by enabling pf(4) on\nthe system and creating states for every connection. Even a default\nruleset to allow all traffic would be sufficient to mitigate this\nissue. \n\nV. Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n# fetch http://security.FreeBSD.org/patches/SA-14:19/tcp.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:19/tcp.patch.asc\n# gpg --verify tcp.patch.asc\n\nb) Apply the patch. Execute the following commands as root:\n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile your kernel as described in\n<URL:http://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the\nsystem. \n\n3) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nVI. Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path Revision\n- -------------------------------------------------------------------------\nstable/8/ r271668\nreleng/8.4/ r271669\nstable/9/ r271668\nreleng/9.1/ r271669\nreleng/9.2/ r271669\nreleng/9.3/ r271669\nstable/10/ r271667\nreleng/10.0/ r271669\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n<URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>\n\nVII", sources: [ { db: "NVD", id: "CVE-2004-0230", }, { db: "CERT/CC", id: "VU#415294", }, { db: "JVNDB", id: "JVNDB-2004-000150", }, { db: "BID", id: "10183", }, { db: "VULHUB", id: "VHN-8660", }, { db: "VULMON", id: "CVE-2004-0230", }, { db: "PACKETSTORM", id: "37558", }, { db: "PACKETSTORM", id: "33143", }, { db: "PACKETSTORM", id: "33160", }, { db: "PACKETSTORM", id: "33159", }, { db: "PACKETSTORM", id: "33152", }, { db: "PACKETSTORM", id: "128284", }, ], trust: 3.33, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=24033", trust: 0.7, type: "exploit", }, { reference: "https://www.scap.org.cn/vuln/vhn-8660", trust: 0.1, type: "unknown", }, ], sources: [ { db: "VULHUB", id: "VHN-8660", }, { db: "VULMON", id: "CVE-2004-0230", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2004-0230", trust: 3.4, }, { db: "CERT/CC", id: "VU#415294", trust: 2.9, }, { db: "BID", id: "10183", trust: 2.9, }, { db: "USCERT", id: "TA04-111A", trust: 2.3, }, { db: "OSVDB", id: "4030", trust: 2.1, }, { db: "MCAFEE", id: "SB10053", trust: 1.5, }, { db: "SECUNIA", id: "11458", trust: 1.2, }, { db: "SECUNIA", id: "11440", trust: 1.2, }, { db: "SECUNIA", id: "22341", trust: 1.2, }, { db: "JUNIPER", id: "JSA10638", trust: 1.2, }, { db: "VUPEN", id: "ADV-2006-3983", trust: 1.2, }, { db: "XF", id: "15886", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2004-000150", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-200408-159", trust: 0.7, }, { db: "NSFOCUS", id: "7605", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2020.1795", trust: 0.6, }, { db: "PACKETSTORM", id: "33159", trust: 0.2, }, { db: "PACKETSTORM", id: "33152", trust: 0.2, }, { db: "PACKETSTORM", id: "33160", trust: 0.2, }, { db: "PACKETSTORM", id: "33143", trust: 0.2, }, { db: "EXPLOIT-DB", id: "24033", trust: 0.2, }, { db: "PACKETSTORM", id: "33202", trust: 0.1, }, { db: "PACKETSTORM", id: "33185", trust: 0.1, }, { db: "PACKETSTORM", id: "33153", trust: 0.1, }, { db: "PACKETSTORM", id: "33172", trust: 0.1, }, { db: "PACKETSTORM", id: "33174", trust: 0.1, }, { db: "PACKETSTORM", id: "33171", trust: 0.1, }, { db: "PACKETSTORM", id: "33243", trust: 0.1, }, { db: "PACKETSTORM", id: "33182", trust: 0.1, }, { db: "EXPLOIT-DB", id: "942", trust: 0.1, }, { db: "EXPLOIT-DB", id: "276", trust: 0.1, }, { db: "EXPLOIT-DB", id: "24031", trust: 0.1, }, { db: "EXPLOIT-DB", id: "24032", trust: 0.1, }, { db: "EXPLOIT-DB", id: "24030", trust: 0.1, }, { db: "EXPLOIT-DB", id: "291", trust: 0.1, }, { db: "SEEBUG", id: "SSVID-77770", trust: 0.1, }, { db: "SEEBUG", id: "SSVID-77769", trust: 0.1, }, { db: "SEEBUG", id: "SSVID-77768", trust: 0.1, }, { db: "SEEBUG", id: "SSVID-77771", trust: 0.1, }, { db: "SEEBUG", id: "SSVID-18409", trust: 0.1, }, { db: "VULHUB", id: "VHN-8660", trust: 0.1, }, { db: "VULMON", id: "CVE-2004-0230", trust: 0.1, }, { db: "SECUNIA", id: "15263", trust: 0.1, }, { db: "PACKETSTORM", id: "37558", trust: 0.1, }, { db: "CERT/CC", id: "VU#498440", trust: 0.1, }, { db: "PACKETSTORM", id: "128284", trust: 0.1, }, ], sources: [ { db: "CERT/CC", id: "VU#415294", }, { db: "VULHUB", id: "VHN-8660", }, { db: "VULMON", id: "CVE-2004-0230", }, { db: "BID", id: "10183", }, { db: "JVNDB", id: "JVNDB-2004-000150", }, { db: "PACKETSTORM", id: "37558", }, { db: "PACKETSTORM", id: "33143", }, { db: "PACKETSTORM", id: "33160", }, { db: "PACKETSTORM", id: "33159", }, { db: "PACKETSTORM", id: "33152", }, { db: "PACKETSTORM", id: "128284", }, { db: "CNNVD", id: "CNNVD-200408-159", }, { db: "NVD", id: "CVE-2004-0230", }, ], }, id: "VAR-200408-0145", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-8660", }, ], trust: 0.5310458972727273, }, last_update_date: "2024-11-29T20:00:05.229000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "TCP RFC Alert", trust: 0.8, url: "http://www.checkpoint.com/services/techsupport/alerts/tcp_dos.html", }, { title: "cisco-sa-20040420-tcp-nonios", trust: 0.8, url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml", }, { title: "cisco-sa-20040420-tcp-ios", trust: 0.8, url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml", }, { title: "HPSBGN01041", trust: 0.8, url: "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBGN01041", }, { title: "IY62006", trust: 0.8, url: "http://www-1.ibm.com/support/docview.wss?uid=isg1IY62006", }, { title: "IY55950", trust: 0.8, url: "http://www-1.ibm.com/support/docview.wss?uid=isg1IY55950", }, { title: "IY55949", trust: 0.8, url: "http://www-1.ibm.com/support/docview.wss?uid=isg1IY55949", }, { title: "TCP プロトコルの脆弱性による SEIL シリーズへの影響について", trust: 0.8, url: "http://www.seil.jp/ann/announce_20040421_01.txt", }, { title: "58784", trust: 0.8, url: "http://www.juniper.net/support/security/alerts/niscc-236929.txt", }, { title: "MS06-064", trust: 0.8, url: "http://www.microsoft.com/technet/security/bulletin/MS06-064.mspx", }, { title: "MS05-019", trust: 0.8, url: "http://www.microsoft.com/technet/security/bulletin/MS05-019.mspx", }, { title: "NV04-001", trust: 0.8, url: "http://www.nec.co.jp/security-info/secinfo/nv04-001.html", }, { title: "Oracle Critical Patch Update Advisory - January 2015", trust: 0.8, url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { title: "Text Form of Oracle Critical Patch Update - January 2015 Risk Matrices", trust: 0.8, url: "http://www.oracle.com/technetwork/topics/security/cpujan2015verbose-1972976.html", }, { title: "RTシリーズのTCPに関する脆弱性について", trust: 0.8, url: "http://www.rtpro.yamaha.co.jp/RT/FAQ/TCPIP/cert-ta04-111a.html", }, { title: "セキュリティ情報(2004年7月20日)", trust: 0.8, url: "http://www.hitachi.co.jp/Prod/comp/storage/diskarray/techsupport/sec_info/sec_20040423-1.html", }, { title: "セキュリティ情報(2004年4月28日)", trust: 0.8, url: "http://www.hitachi.co.jp/Prod/comp/storage/diskarray/techsupport/sec_info/sec_20040423-2.html", }, { title: "January 2015 Critical Patch Update Released", trust: 0.8, url: "https://blogs.oracle.com/security/entry/january_2015_critical_patch_update", }, { title: "TCPに潜在する脆弱性 (2004年10月7日)", trust: 0.8, url: "http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_sd_200402.html", }, { title: "SYM05-008", trust: 0.8, url: "http://securityresponse.symantec.com/avcenter/security/Content/2005.05.02.html", }, { title: "cisco-sa-20040420-tcp-nonios", trust: 0.8, url: "http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sa-20040420-tcp-nonios-j.shtml", }, { title: "cisco-sa-20040420-tcp-ios", trust: 0.8, url: "http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sa-20040420-tcp-ios-j.shtml", }, { title: "SYM05-008", trust: 0.8, url: "http://www.symantec.com/region/jp/avcenter/security/content/2005.05.02.html", }, { title: "TCP RFCに関するAlert", trust: 0.8, url: "http://www.checkpoint.co.jp/techsupport/alerts/tcp_rfc_alert.html", }, { title: "TCP の脆弱性について", trust: 0.8, url: "http://www.allied-telesis.co.jp/support/list/faq/vuls/20040421.html", }, { title: "「TCP プロトコルに潜在する信頼性の問題」に関する製品の対応について", trust: 0.8, url: "http://www.hitachi.co.jp/Prod/comp/Secureplaza/html/hirt/20040422.html", }, { title: "MS06-064", trust: 0.8, url: "http://www.microsoft.com/japan/technet/security/bulletin/MS06-064.mspx", }, { title: "MS05-019", trust: 0.8, url: "http://www.microsoft.com/japan/technet/security/bulletin/MS05-019.mspx", }, { title: "[お知らせ] TCPに潜在する脆弱性への対応について", trust: 0.8, url: "http://software.fujitsu.com/jp/security/vulnerabilities/cert/236929_tcp.html", }, { title: "Cisco: TCP Vulnerabilities in Multiple Non-IOS Cisco Products", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20040420-tcp-nonios", }, { title: "Cisco: TCP Vulnerabilities in Multiple IOS-Based Cisco Products", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20040420-tcp-ios", }, { title: "Fortinet Security Advisories: CVE-2004-0230 Blind Reset Attack Using the RST/SYN Bit", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories&qid=FG-IR-16-039", }, { title: "Oracle: Oracle Critical Patch Update Advisory - January 2015", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51", }, { title: "ips-assessment-reports", trust: 0.1, url: "https://github.com/gabrieljcs/ips-assessment-reports ", }, { title: "dsm_ips", trust: 0.1, url: "https://github.com/biswajitde/dsm_ips ", }, { title: "rhsecapi", trust: 0.1, url: "https://github.com/RedHatOfficial/rhsecapi ", }, { title: "cve-pylib", trust: 0.1, url: "https://github.com/RedHatProductSecurity/cve-pylib ", }, ], sources: [ { db: "VULMON", id: "CVE-2004-0230", }, { db: "JVNDB", id: "JVNDB-2004-000150", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-Other", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2004-0230", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.6, url: "http://www.securityfocus.com/bid/10183", }, { trust: 2.3, url: "http://www.us-cert.gov/cas/techalerts/ta04-111a.html", }, { trust: 2.1, url: "http://www.kb.cert.org/vuls/id/415294", }, { trust: 1.5, url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { trust: 1.5, url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", }, { trust: 1.4, url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10053", }, { trust: 1.4, url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0230", }, { trust: 1.2, url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml", }, { trust: 1.2, url: "http://kb.juniper.net/jsa10638", }, { trust: 1.2, url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { trust: 1.2, url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019", }, { trust: 1.2, url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064", }, { trust: 1.2, url: "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2004-006.txt.asc", }, { trust: 1.2, url: "http://www.osvdb.org/4030", }, { trust: 1.2, url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2689", }, { trust: 1.2, url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a270", }, { trust: 1.2, url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a3508", }, { trust: 1.2, url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a4791", }, { trust: 1.2, url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5711", }, { trust: 1.2, url: "ftp://ftp.sco.com/pub/updates/unixware/scosa-2005.14/scosa-2005.14.txt", }, { trust: 1.2, url: "ftp://ftp.sco.com/pub/updates/openserver/scosa-2005.3/scosa-2005.3.txt", }, { trust: 1.2, url: "ftp://ftp.sco.com/pub/updates/openserver/scosa-2005.9/scosa-2005.9.txt", }, { trust: 1.2, url: "http://secunia.com/advisories/11440", }, { trust: 1.2, url: "http://secunia.com/advisories/11458", }, { trust: 1.2, url: "http://secunia.com/advisories/22341", }, { trust: 1.2, url: "ftp://patches.sgi.com/support/free/security/advisories/20040403-01-a.asc", }, { trust: 1.2, url: "http://www.vupen.com/english/advisories/2006/3983", }, { trust: 1.2, url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15886", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=108302060014745&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=108506952116653&w=2", }, { trust: 1.1, url: "http://xforce.iss.net/xforce/alerts/id/170", }, { trust: 0.8, url: "http://www.uniras.gov.uk/niscc/docs/al-20040420-00199.html?lang=en", }, { trust: 0.8, url: "http://www.niscc.gov.uk/niscc/docs/re-20040420-00391.pdf", }, { trust: 0.8, url: "http://www.ietf.org/rfc/rfc3562.txt", }, { trust: 0.8, url: "http://www.ietf.org/rfc/rfc2385.txt", }, { trust: 0.8, url: "http://www.ietf.org/rfc/rfc1323.txt", }, { trust: 0.8, url: "http://www.osvdb.org/displayvuln.php?osvdb_id=4030", }, { trust: 0.8, url: "http://www.ciac.org/ciac/bulletins/o-124.shtml", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0230", }, { trust: 0.8, url: "http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20040420-00391.xml", }, { trust: 0.8, url: "http://www.jpcert.or.jp/wr/2004/wr041702.txt", }, { trust: 0.8, url: "http://www.jpcert.or.jp/at/2004/at040003.txt", }, { trust: 0.8, url: "http://jvn.jp/niscc/niscc-236929/index.html", }, { trust: 0.8, url: "http://jvn.jp/cert/jvnta04-111a/index.html", }, { trust: 0.8, url: "http://jvn.jp/tr/trta04-111a", }, { trust: 0.8, url: "http://www.cpni.gov.uk/docs/re-20040420-00391.pdf?lang=en", }, { trust: 0.8, url: "http://xforce.iss.net/xforce/xfdb/15886", }, { trust: 0.8, url: "http://www.isskk.co.jp/support/techinfo/general/tcp_170.html", }, { trust: 0.6, url: "http://www.cisco.com/en/us/products/products_security_advisory09186a008021ba2f.shtml", }, { trust: 0.6, url: "http://www.nsfocus.net/vulndb/7605", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2020.1795/", }, { trust: 0.4, url: "http://support.avaya.com/elmodocs2/security/asa-2005-097_scasa-2005-14.pdf", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2004-0230", }, { trust: 0.3, url: "http://www.seil.jp/en/ann/announce_en_20040421_01.txt", }, { trust: 0.3, url: "http://support.avaya.com/elmodocs2/security/asa-2006-217.htm", }, { trust: 0.3, url: "http://www-1.ibm.com/support/docview.wss?uid=isg1iy55949", }, { trust: 0.3, url: "http://www-1.ibm.com/support/docview.wss?uid=isg1iy55950", }, { trust: 0.3, url: "http://www-1.ibm.com/support/docview.wss?uid=isg1iy62006", }, { trust: 0.3, url: "http://www.microsoft.com/technet/security/bulletin/ms05-019.mspx", }, { trust: 0.3, url: "http://www.microsoft.com/technet/security/bulletin/ms06-064.mspx", }, { trust: 0.3, url: "http://www.bluecoat.com/support/knowledge/advisory_tcp_can-2004-0230.html", }, { trust: 0.3, url: "http://securityresponse.symantec.com/avcenter/security/content/2005.05.02.html", }, { trust: 0.3, url: "http://www.juniper.net/support/alert.html", }, { trust: 0.3, url: "http://www.checkpoint.com/techsupport/alerts/tcp_dos.html", }, { trust: 0.3, url: "https://www.freebsd.org/security/advisories/freebsd-sa-14:19.tcp.asc", }, { trust: 0.3, url: "https://downloads.avaya.com/css/p8/documents/101006870", }, { trust: 0.3, url: "https://www.alienvault.com/forums/discussion/5706/security-advisory-alienvault-v5-1-addresses-6-vulnerabilities", }, { trust: 0.2, url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml.", }, { trust: 0.2, url: "http://www.cisco.com/warp/public/707/", }, { trust: 0.2, url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml.", }, { trust: 0.2, url: "http://www.cisco.com/go/psirt.", }, { trust: 0.2, url: "http://www.cisco.com.", }, { trust: 0.2, url: "http://www.cisco.com/warp/public/687/directory/dirtac.shtml", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=108302060014745&w=2", }, { trust: 0.1, url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10053", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=108506952116653&w=2", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/.html", }, { trust: 0.1, url: "https://www.rapid7.com/db/vulnerabilities/tcp-seq-num-approximation", }, { trust: 0.1, url: "https://github.com/gabrieljcs/ips-assessment-reports", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://www.exploit-db.com/exploits/24033/", }, { trust: 0.1, url: "http://secunia.com/secunia_security_advisories/", }, { trust: 0.1, url: "http://secunia.com/about_secunia_advisories/", }, { trust: 0.1, url: "http://secunia.com/advisories/11440/", }, { trust: 0.1, url: "http://secunia.com/product/4586/", }, { trust: 0.1, url: "http://secunia.com/secunia_vacancies/", }, { trust: 0.1, url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org", }, { trust: 0.1, url: "http://secunia.com/advisories/15263/", }, { trust: 0.1, url: "http://www.kb.cert.org/vuls/id/415294#systems.", }, { trust: 0.1, url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm>.", }, { trust: 0.1, url: "http://www.kb.cert.org/vuls/id/498440)", }, { trust: 0.1, url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm)", }, { trust: 0.1, url: "http://www.cert.org/advisories/ca-2001-09.html>),", }, { trust: 0.1, url: "http://www.cymru.com/>).", }, { trust: 0.1, url: "http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/bgp.htm>", }, { trust: 0.1, url: "http://www.cisco.com/en/us/products/sw/iosswrel/", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc0793.txt.", }, { trust: 0.1, url: "http://www.cisco.com/en/us/products/sw/iosswrel/ps1835", }, { trust: 0.1, url: "http://www.cisco.com/en/us/products/sw/iosswrel/ps1828/", }, { trust: 0.1, url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml,", }, { trust: 0.1, url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml,", }, { trust: 0.1, url: "http://www.cisco.com/en/us/products/sw/iosswrel/ps1835/", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc0793.txt", }, { trust: 0.1, url: "http://www.qorbit.net/documents/junos-bgp-template.pdf\">http://www.qorbit.net/documents/junos-bgp-template.pdf", }, { trust: 0.1, url: "http://www.ietf.org\">the", }, { trust: 0.1, url: "http://www.cymru.com/documents/ip-stack-tuning.html\">http://www.cymru.com/documents/ip-stack-tuning.html", }, { trust: 0.1, url: "http://www.polycom.com/securitycenter\">", }, { trust: 0.1, url: "http://www.cymru.com/documents/secure-bgp-template.html\">http://www.cymru.com/documents/secure-bgp-template.html", }, { trust: 0.1, url: "http://www.cymru.com/documents/secure-bgp-template.html\">", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc793.txt\">", }, { trust: 0.1, url: "http://cve.mitre.org/cve\">cve</a>", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc2827.txt</a></td>", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc3682.txt\">", }, { trust: 0.1, url: "http://www.osvdb.org\">open", }, { trust: 0.1, url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm\">http://www.uniras.gov.uk/vuls/2004/236929/index.htm</a><br>", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc0793.txt\">rfc", }, { trust: 0.1, url: "http://www.niscc.gov.uk/aboutniscc/index.htm\">http://www.niscc.gov.uk/aboutniscc/index.htm</a><br>", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc1323.txt</a></td>", }, { trust: 0.1, url: "http://www.niscc.gov.uk/bgp%20filtering%20guide.pdf\">", }, { trust: 0.1, url: "http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt</a></td>", }, { trust: 0.1, url: "http://www.osvdb.org/displayvuln.php?osvdb_id=4030\">4030</a>.<br>", }, { trust: 0.1, url: "http://www.qorbit.net/documents/junos-bgp-template.pdf\">", }, { trust: 0.1, url: "http://www.niscc.gov.uk/images/newtitle.gif\"", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc1323.txt\">", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc3562.txt</a></td>", }, { trust: 0.1, url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml\">http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml</a></td>", }, { trust: 0.1, url: "http://www.cymru.com/documents/secure-bgp-template.html</a></td>", }, { trust: 0.1, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0230\">", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc3562.txt\">", }, { trust: 0.1, url: "http://www.sans.org/y2k/egress.htm\">http://www.sans.org/y2k/egress.htm</a>.<br>", }, { trust: 0.1, url: "http://www.sans.org/y2k/egress.htm</a></td>", }, { trust: 0.1, url: "http://www.niscc.gov.uk/bgp", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc2385.txt\">", }, { trust: 0.1, url: "http://www.polycom.com/securitycenter</a>.</td>", }, { trust: 0.1, url: "http://www.cymru.com/documents/ip-stack-tuning.html</a></td>", }, { trust: 0.1, url: "http://www.niscc.gov.uk/bgp%20filtering%20guide.pdf\">http://www.niscc.gov.uk/bgp", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc1771.txt\">", }, { trust: 0.1, url: "http://www.uniras.gov.uk/uniras.asc\">http://www.uniras.gov.uk/uniras.asc</a>.<br>", }, { trust: 0.1, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0230</a></td>", }, { trust: 0.1, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0230\">can-2004-0230</a>.<br>", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc2385.txt\">rfc", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc2385.txt</a></td>", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc1323.txt\">rfc", }, { trust: 0.1, url: "http://www.checkpoint.com/techsupport/alerts/tcp_dos.html\">", }, { trust: 0.1, url: "http://www.seil.jp/en/ann/announce_en_20040421_01.txt</a>.</td>", }, { trust: 0.1, url: "http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt\">", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc793.txt</a></td>", }, { trust: 0.1, url: "http://www.jpcert.or.jp\">jpcert/cc</a>", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc2827.txt\">", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc2827.txt\">rfc", }, { trust: 0.1, url: "http://www.iniche.com\">www.iniche.com</a>", }, { trust: 0.1, url: "http://www.osvdb.org/displayvuln.php?osvdb_id=4030</a></td>", }, { trust: 0.1, url: "http://www.seil.jp/en/ann/announce_en_20040421_01.txt\">", }, { trust: 0.1, url: "http://www.qorbit.net/documents/junos-bgp-template.pdf</a></td>", }, { trust: 0.1, url: "http://www.sans.org/y2k/egress.htm\">", }, { trust: 0.1, url: "http://www.osvdb.org/displayvuln.php?osvdb_id=4030\">", }, { trust: 0.1, url: "http://www.checkpoint.com/techsupport/alerts/tcp_dos.html</a>.</td>", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc1771.txt</a></td>", }, { trust: 0.1, url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml\">http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml</a><br>", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc3682.txt</a></td>", }, { trust: 0.1, url: "http://www.ietf.org/rfc/rfc3562.txt\">rfc", }, { trust: 0.1, url: "http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt\">http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt</a><br>", }, { trust: 0.1, url: "http://www.cymru.com/documents/ip-stack-tuning.html\">", }, { trust: 0.1, url: "https://www.juniper.net/support\">https://www.juniper.net/support</a>.", }, { trust: 0.1, url: "http://www.jpcert.or.jp/at/2004/at040003.txt\">http://www.jpcert.or.jp/at/2004/at040003.txt</a>.</font></i><br>", }, { trust: 0.1, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0230>", }, { trust: 0.1, url: "http://security.freebsd.org/>.", }, { trust: 0.1, url: "http://www.freebsd.org/handbook/kernelconfig.html>", }, { trust: 0.1, url: "http://security.freebsd.org/patches/sa-14:19/tcp.patch", }, { trust: 0.1, url: "http://security.freebsd.org/patches/sa-14:19/tcp.patch.asc", }, { trust: 0.1, url: "http://security.freebsd.org/advisories/freebsd-sa-14:19.tcp.asc>", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-0230", }, { trust: 0.1, url: "http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>", }, ], sources: [ { db: "CERT/CC", id: "VU#415294", }, { db: "VULHUB", id: "VHN-8660", }, { db: "VULMON", id: "CVE-2004-0230", }, { db: "BID", id: "10183", }, { db: "JVNDB", id: "JVNDB-2004-000150", }, { db: "PACKETSTORM", id: "37558", }, { db: "PACKETSTORM", id: "33143", }, { db: "PACKETSTORM", id: "33160", }, { db: "PACKETSTORM", id: "33159", }, { db: "PACKETSTORM", id: "33152", }, { db: "PACKETSTORM", id: "128284", }, { db: "CNNVD", id: "CNNVD-200408-159", }, { db: "NVD", id: "CVE-2004-0230", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CERT/CC", id: "VU#415294", }, { db: "VULHUB", id: "VHN-8660", }, { db: "VULMON", id: "CVE-2004-0230", }, { db: "BID", id: "10183", }, { db: "JVNDB", id: "JVNDB-2004-000150", }, { db: "PACKETSTORM", id: "37558", }, { db: "PACKETSTORM", id: "33143", }, { db: "PACKETSTORM", id: "33160", }, { db: "PACKETSTORM", id: "33159", }, { db: "PACKETSTORM", id: "33152", }, { db: "PACKETSTORM", id: "128284", }, { db: "CNNVD", id: "CNNVD-200408-159", }, { db: "NVD", id: "CVE-2004-0230", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2004-04-20T00:00:00", db: "CERT/CC", id: "VU#415294", }, { date: "2004-08-18T00:00:00", db: "VULHUB", id: "VHN-8660", }, { date: "2004-08-18T00:00:00", db: "VULMON", id: "CVE-2004-0230", }, { date: "2004-04-20T00:00:00", db: "BID", id: "10183", }, { date: "2007-04-01T00:00:00", db: "JVNDB", id: "JVNDB-2004-000150", }, { date: "2005-05-29T20:22:44", db: "PACKETSTORM", id: "37558", }, { date: "2004-04-23T05:59:41", db: "PACKETSTORM", id: "33143", }, { date: "2004-04-22T07:16:00", db: "PACKETSTORM", id: "33160", }, { date: "2004-04-22T07:14:00", db: "PACKETSTORM", id: "33159", }, { date: "2004-04-22T02:04:00", db: "PACKETSTORM", id: "33152", }, { date: "2014-09-17T15:58:15", db: "PACKETSTORM", id: "128284", }, { date: "2004-08-18T00:00:00", db: "CNNVD", id: "CNNVD-200408-159", }, { date: "2004-08-18T04:00:00", db: "NVD", id: "CVE-2004-0230", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2006-05-01T00:00:00", db: "CERT/CC", id: "VU#415294", }, { date: "2018-10-19T00:00:00", db: "VULHUB", id: "VHN-8660", }, { date: "2018-10-19T00:00:00", db: "VULMON", id: "CVE-2004-0230", }, { date: "2015-08-12T22:24:00", db: "BID", id: "10183", }, { date: "2015-01-22T00:00:00", db: "JVNDB", id: "JVNDB-2004-000150", }, { date: "2020-05-21T00:00:00", db: "CNNVD", id: "CNNVD-200408-159", }, { date: "2018-10-19T15:30:05.173000", db: "NVD", id: "CVE-2004-0230", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "PACKETSTORM", id: "33143", }, { db: "CNNVD", id: "CNNVD-200408-159", }, ], trust: 0.7, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The Border Gateway Protocol relies on persistent TCP sessions without specifying authentication requirements", sources: [ { db: "CERT/CC", id: "VU#415294", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-200408-159", }, ], trust: 0.6, }, }
gsd-2004-0230
Vulnerability from gsd
{ GSD: { alias: "CVE-2004-0230", description: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", id: "GSD-2004-0230", references: [ "https://www.suse.com/security/cve/CVE-2004-0230.html", "https://packetstormsecurity.com/files/cve/CVE-2004-0230", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2004-0230", ], details: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", id: "GSD-2004-0230", modified: "2023-12-13T01:22:54.812053Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0230", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "oval:org.mitre.oval:def:2689", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689", }, { name: "oval:org.mitre.oval:def:3508", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508", }, { name: "TA04-111A", refsource: "CERT", url: "http://www.us-cert.gov/cas/techalerts/TA04-111A.html", }, { name: "oval:org.mitre.oval:def:5711", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711", }, { name: "20040425 Perl code exploting TCP not checking RST ACK.", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=108302060014745&w=2", }, { name: "SSRT061264", refsource: "HP", url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { name: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", refsource: "MISC", url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", }, { name: "MS06-064", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064", }, { name: "11440", refsource: "SECUNIA", url: "http://secunia.com/advisories/11440", }, { name: "http://kb.juniper.net/JSA10638", refsource: "CONFIRM", url: "http://kb.juniper.net/JSA10638", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "VU#415294", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/415294", }, { name: "SSRT4696", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=108506952116653&w=2", }, { name: "SCOSA-2005.9", refsource: "SCO", url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt", }, { name: "20040403-01-A", refsource: "SGI", url: "ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc", }, { name: "MS05-019", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019", }, { name: "HPSBST02161", refsource: "HP", url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { name: "20040420 TCP Vulnerabilities in Multiple IOS-Based Cisco Products", refsource: "CISCO", url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml", }, { name: "SCOSA-2005.3", refsource: "SCO", url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt", }, { name: "10183", refsource: "BID", url: "http://www.securityfocus.com/bid/10183", }, { name: "oval:org.mitre.oval:def:4791", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791", }, { name: "SCOSA-2005.14", refsource: "SCO", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt", }, { name: "oval:org.mitre.oval:def:270", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270", }, { name: "tcp-rst-dos(15886)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15886", }, { name: "4030", refsource: "OSVDB", url: "http://www.osvdb.org/4030", }, { name: "22341", refsource: "SECUNIA", url: "http://secunia.com/advisories/22341", }, { name: "NetBSD-SA2004-006", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc", }, { name: "ADV-2006-3983", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2006/3983", }, { name: "11458", refsource: "SECUNIA", url: "http://secunia.com/advisories/11458", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:openpgp:openpgp:2.6.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "8.6", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:xinuos:openserver:5.0.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:xinuos:openserver:5.0.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:xinuos:unixware:7.1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:xinuos:unixware:7.1.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0230", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], }, ], }, references: { reference_data: [ { name: "10183", refsource: "BID", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/10183", }, { name: "20040403-01-A", refsource: "SGI", tags: [ "Third Party Advisory", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc", }, { name: "NetBSD-SA2004-006", refsource: "NETBSD", tags: [ "Third Party Advisory", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc", }, { name: "SCOSA-2005.3", refsource: "SCO", tags: [ "Third Party Advisory", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt", }, { name: "SCOSA-2005.9", refsource: "SCO", tags: [ "Third Party Advisory", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt", }, { name: "SCOSA-2005.14", refsource: "SCO", tags: [ "Third Party Advisory", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt", }, { name: "VU#415294", refsource: "CERT-VN", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/415294", }, { name: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", refsource: "MISC", tags: [ "Broken Link", ], url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", }, { name: "4030", refsource: "OSVDB", tags: [ "Broken Link", ], url: "http://www.osvdb.org/4030", }, { name: "11440", refsource: "SECUNIA", tags: [ "Permissions Required", "Third Party Advisory", "VDB Entry", ], url: "http://secunia.com/advisories/11440", }, { name: "11458", refsource: "SECUNIA", tags: [ "Permissions Required", "Third Party Advisory", "VDB Entry", ], url: "http://secunia.com/advisories/11458", }, { name: "22341", refsource: "SECUNIA", tags: [ "Permissions Required", "Third Party Advisory", "VDB Entry", ], url: "http://secunia.com/advisories/22341", }, { name: "ADV-2006-3983", refsource: "VUPEN", tags: [ "Permissions Required", ], url: "http://www.vupen.com/english/advisories/2006/3983", }, { name: "20040420 TCP Vulnerabilities in Multiple IOS-Based Cisco Products", refsource: "CISCO", tags: [ "Broken Link", ], url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml", }, { name: "TA04-111A", refsource: "CERT", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA04-111A.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", refsource: "CONFIRM", tags: [ "Patch", "Third Party Advisory", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", tags: [ "Patch", "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "http://kb.juniper.net/JSA10638", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "http://kb.juniper.net/JSA10638", }, { name: "20040425 Perl code exploting TCP not checking RST ACK.", refsource: "BUGTRAQ", tags: [], url: "http://marc.info/?l=bugtraq&m=108302060014745&w=2", }, { name: "SSRT4696", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=108506952116653&w=2", }, { name: "tcp-rst-dos(15886)", refsource: "XF", tags: [], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15886", }, { name: "oval:org.mitre.oval:def:5711", refsource: "OVAL", tags: [], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711", }, { name: "oval:org.mitre.oval:def:4791", refsource: "OVAL", tags: [], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791", }, { name: "oval:org.mitre.oval:def:3508", refsource: "OVAL", tags: [], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508", }, { name: "oval:org.mitre.oval:def:270", refsource: "OVAL", tags: [], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270", }, { name: "oval:org.mitre.oval:def:2689", refsource: "OVAL", tags: [], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689", }, { name: "MS06-064", refsource: "MS", tags: [], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064", }, { name: "MS05-019", refsource: "MS", tags: [], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019", }, { name: "SSRT061264", refsource: "HP", tags: [], url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, }, lastModifiedDate: "2018-10-19T15:30Z", publishedDate: "2004-08-18T04:00Z", }, }, }
ghsa-58p6-7f25-xqv3
Vulnerability from github
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
{ affected: [], aliases: [ "CVE-2004-0230", ], database_specific: { cwe_ids: [], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2004-08-18T04:00:00Z", severity: "MODERATE", }, details: "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", id: "GHSA-58p6-7f25-xqv3", modified: "2022-05-03T03:12:59Z", published: "2022-05-03T03:12:59Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2004-0230", }, { type: "WEB", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019", }, { type: "WEB", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064", }, { type: "WEB", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15886", }, { type: "WEB", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711", }, { type: "WEB", url: "http://kb.juniper.net/JSA10638", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=108302060014745&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=108506952116653&w=2", }, { type: "WEB", url: "http://secunia.com/advisories/11440", }, { type: "WEB", url: "http://secunia.com/advisories/11458", }, { type: "WEB", url: "http://secunia.com/advisories/22341", }, { type: "WEB", url: "http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml", }, { type: "WEB", url: "http://www.kb.cert.org/vuls/id/415294", }, { type: "WEB", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { type: "WEB", url: "http://www.osvdb.org/4030", }, { type: "WEB", url: "http://www.securityfocus.com/archive/1/449179/100/0/threaded", }, { type: "WEB", url: "http://www.securityfocus.com/bid/10183", }, { type: "WEB", url: "http://www.uniras.gov.uk/vuls/2004/236929/index.htm", }, { type: "WEB", url: "http://www.us-cert.gov/cas/techalerts/TA04-111A.html", }, { type: "WEB", url: "http://www.vupen.com/english/advisories/2006/3983", }, ], schema_version: "1.4.0", severity: [], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.