Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2014-9717
Vulnerability from cvelistv5
Published
2016-05-02 10:00
Modified
2024-08-06 13:55
Severity ?
EPSS score ?
Summary
fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:55:04.157Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2016:1690", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html", }, { name: "SUSE-SU-2016:1696", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { name: "[oss-security] 20150417 USERNS allows circumventing MNT_LOCKED", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/04/17/4", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1226751", }, { name: "[linux-kernel] 20141007 [PATCH] mnt: don't allow to detach the namespace root", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://groups.google.com/forum/message/raw?msg=linux.kernel/HnegnbXk0Vs/RClojwJzAFEJ", }, { name: "[containers] 20150402 [PATCH review 0/19] Locked mount and loopback mount fixes", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.spinics.net/lists/linux-containers/msg30786.html", }, { name: "74226", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/74226", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2", }, { name: "SUSE-SU-2016:1937", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-10-07T00:00:00", descriptions: [ { lang: "en", value: "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-08-10T15:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "SUSE-SU-2016:1690", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html", }, { name: "SUSE-SU-2016:1696", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { name: "[oss-security] 20150417 USERNS allows circumventing MNT_LOCKED", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2015/04/17/4", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1226751", }, { name: "[linux-kernel] 20141007 [PATCH] mnt: don't allow to detach the namespace root", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://groups.google.com/forum/message/raw?msg=linux.kernel/HnegnbXk0Vs/RClojwJzAFEJ", }, { name: "[containers] 20150402 [PATCH review 0/19] Locked mount and loopback mount fixes", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.spinics.net/lists/linux-containers/msg30786.html", }, { name: "74226", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/74226", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2", }, { name: "SUSE-SU-2016:1937", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-9717", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2016:1690", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html", }, { name: "SUSE-SU-2016:1696", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html", }, { name: "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", refsource: "CONFIRM", url: "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { name: "[oss-security] 20150417 USERNS allows circumventing MNT_LOCKED", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/04/17/4", }, { name: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1", refsource: "CONFIRM", url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1226751", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1226751", }, { name: "[linux-kernel] 20141007 [PATCH] mnt: don't allow to detach the namespace root", refsource: "MLIST", url: "https://groups.google.com/forum/message/raw?msg=linux.kernel/HnegnbXk0Vs/RClojwJzAFEJ", }, { name: "[containers] 20150402 [PATCH review 0/19] Locked mount and loopback mount fixes", refsource: "MLIST", url: "http://www.spinics.net/lists/linux-containers/msg30786.html", }, { name: "74226", refsource: "BID", url: "http://www.securityfocus.com/bid/74226", }, { name: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2", refsource: "CONFIRM", url: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2", }, { name: "SUSE-SU-2016:1937", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-9717", datePublished: "2016-05-02T10:00:00", dateReserved: "2015-04-17T00:00:00", dateUpdated: "2024-08-06T13:55:04.157Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2014-9717\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-05-02T10:59:06.593\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.\"},{\"lang\":\"es\",\"value\":\"fs/namespace.c en el kernel de Linux en versiones anteriores a 4.0.2 procesa llamadas de sistema MNT_DETACH umount2 sin verificar que el indicador MNT_LOCKED no está establecido, lo que permite a usuarios locales eludir restricciones dedicadas al acceso y navegar a localizaciones de archivos de sistema bajo un montaje llamando a umount2 en un espacio de nombres de usuario.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":4.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":3.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0.1\",\"matchCriteriaId\":\"D460F925-66B4-4BED-BD3B-91A8C60B8AC4\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/04/17/4\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/74226\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.spinics.net/lists/linux-containers/msg30786.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1226751\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://groups.google.com/forum/message/raw?msg=linux.kernel/HnegnbXk0Vs/RClojwJzAFEJ\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/04/17/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/74226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.spinics.net/lists/linux-containers/msg30786.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1226751\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://groups.google.com/forum/message/raw?msg=linux.kernel/HnegnbXk0Vs/RClojwJzAFEJ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
suse-su-2016:1937-1
Vulnerability from csaf_suse
Published
2016-08-02 11:06
Modified
2016-08-02 11:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.61 to receive various security and bugfixes.
Main feature additions:
- Improved support for Clustered File System (CephFS, fate#318586).
The following security bugs were fixed:
- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).
- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).
- CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
The following non-security bugs were fixed:
- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
- Add wait_event_cmd() (bsc#953048).
- Btrfs: be more precise on errors when getting an inode from disk (bsc#981038).
- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).
- Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).
- Btrfs: do not use src fd for printk (bsc#980348).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).
- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).
- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).
- Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).
- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).
- Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844).
- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).
- CacheFiles: Handle object being killed before being set up (bsc#971049).
- EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521).
- EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521).
- EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521).
- EDAC/sb_edac: Fix computation of channel address (bsc#979521).
- EDAC: Correct channel count limit (bsc#979521).
- EDAC: Remove arbitrary limit on number of channels (bsc#979521).
- EDAC: Use static attribute groups for managing sysfs entries (bsc#979521).
- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).
- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).
- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).
- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).
- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).
- FS-Cache: Out of line fscache_operation_init() (bsc#971049).
- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).
- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).
- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).
- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).
- FS-Cache: Timeout for releasepage() (bsc#971049).
- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).
- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- Fix kabi issue (bsc#971049).
- Input: i8042 - lower log level for 'no controller' message (bsc#945345).
- KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- NVMe: Unify controller probe and resume (bsc#979347).
- NVMe: init nvme queue before enabling irq (bsc#662458).
- PCI/AER: Clear error status registers during enumeration and restore (bsc#985978).
- Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with head exceeding page size (bsc#978469).
- Revert 'scsi: fix soft lockup in scsi_remove_target() on module removal' (bsc#970609).
- SCSI: Increase REPORT_LUNS timeout (bsc#982282).
- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).
- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece.
- Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570).
- Use mainline variant of hyperv KVP IP failover patch (bnc#978527)
- VSOCK: Fix lockdep issue (bsc#977417).
- VSOCK: sock_put wasn't safe to call in interrupt context (bsc#977417).
- Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- base: make module_create_drivers_dir race-free (bnc#983977).
- block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124).
- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).
- cdc_ncm: workaround for EM7455 'silent' data interface (bnc#988552).
- ceph fscache: Introduce a routine for uncaching single no data page from fscache.
- ceph fscache: Uncaching no data page from fscache in readpage().
- ceph: Asynchronous IO support.
- ceph: Avoid to propagate the invalid page point.
- ceph: Clean up if error occurred in finish_read().
- ceph: EIO all operations after forced umount.
- ceph: Implement writev/pwritev for sync operation.
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: add acl for cephfs.
- ceph: add acl, noacl options for cephfs mount.
- ceph: add get_name() NFS export callback.
- ceph: add get_parent() NFS export callback.
- ceph: add imported caps when handling cap export message.
- ceph: add inline data to pagecache.
- ceph: add missing init_acl() for mkdir() and atomic_open().
- ceph: add open export target session helper.
- ceph: add request to i_unsafe_dirops when getting unsafe reply.
- ceph: additional debugfs output.
- ceph: always re-send cap flushes when MDS recovers.
- ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync).
- ceph: avoid releasing caps that are being used.
- ceph: avoid sending unnessesary FLUSHSNAP message.
- ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename().
- ceph: cast PAGE_SIZE to size_t in ceph_sync_write().
- ceph: ceph_frag_contains_value can be boolean.
- ceph: ceph_get_parent() can be static.
- ceph: check OSD caps before read/write.
- ceph: check buffer size in ceph_vxattrcb_layout().
- ceph: check caps in filemap_fault and page_mkwrite.
- ceph: check directory's completeness before emitting directory entry.
- ceph: check inode caps in ceph_d_revalidate.
- ceph: check unsupported fallocate mode.
- ceph: check zero length in ceph_sync_read().
- ceph: checking for IS_ERR instead of NULL.
- ceph: cleanup unsafe requests when reconnecting is denied.
- ceph: cleanup use of ceph_msg_get.
- ceph: clear directory's completeness when creating file.
- ceph: convert inline data to normal data before data write.
- ceph: do not assume r_old_dentry[_dir] always set together.
- ceph: do not chain inode updates to parent fsync.
- ceph: do not grabs open file reference for aborted request.
- ceph: do not include ceph.{file,dir}.layout vxattr in listxattr().
- ceph: do not include used caps in cap_wanted.
- ceph: do not invalidate page cache when inode is no longer used.
- ceph: do not mark dirty caps when there is no auth cap.
- ceph: do not pre-allocate space for cap release messages.
- ceph: do not set r_old_dentry_dir on link().
- ceph: do not trim auth cap when there are cap snaps.
- ceph: do not zero i_wrbuffer_ref when reconnecting is denied.
- ceph: drop cap releases in requests composed before cap reconnect.
- ceph: drop extra open file reference in ceph_atomic_open().
- ceph: drop unconnected inodes.
- ceph: exclude setfilelock requests when calculating oldest tid.
- ceph: export ceph_session_state_name function.
- ceph: fetch inline data when getting Fcr cap refs.
- ceph: fix __dcache_readdir().
- ceph: fix a comment typo.
- ceph: fix append mode write.
- ceph: fix atomic_open snapdir.
- ceph: fix bool assignments.
- ceph: fix cache revoke race.
- ceph: fix ceph_dir_llseek().
- ceph: fix ceph_fh_to_parent().
- ceph: fix ceph_removexattr().
- ceph: fix ceph_set_acl().
- ceph: fix ceph_writepages_start().
- ceph: fix dcache/nocache mount option.
- ceph: fix dentry leaks.
- ceph: fix directory fsync.
- ceph: fix divide-by-zero in __validate_layout().
- ceph: fix double page_unlock() in page_mkwrite().
- ceph: fix dout() compile warnings in ceph_filemap_fault().
- ceph: fix file lock interruption.
- ceph: fix flush tid comparision.
- ceph: fix flushing caps.
- ceph: fix llistxattr on symlink.
- ceph: fix message length computation.
- ceph: fix mksnap crash.
- ceph: fix null pointer dereference in send_mds_reconnect().
- ceph: fix pr_fmt() redefinition.
- ceph: fix queuing inode to mdsdir's snaprealm.
- ceph: fix reading inline data when i_size greater than PAGE_SIZE.
- ceph: fix request time stamp encoding.
- ceph: fix reset_readdir().
- ceph: fix setting empty extended attribute.
- ceph: fix sizeof(struct tYpO *) typo.
- ceph: fix snap context leak in error path.
- ceph: fix trim caps.
- ceph: fix uninline data function.
- ceph: flush cap release queue when trimming session caps.
- ceph: flush inline version.
- ceph: forbid mandatory file lock.
- ceph: fscache: Update object store limit after file writing.
- ceph: fscache: Wait for completion of object initialization.
- ceph: fscache: add an interface to synchronize object store limit.
- ceph: get inode size for each append write.
- ceph: handle -ESTALE reply.
- ceph: handle SESSION_FORCE_RO message.
- ceph: handle cap export race in try_flush_caps().
- ceph: handle cap import atomically.
- ceph: handle frag mismatch between readdir request and reply.
- ceph: handle race between cap reconnect and cap release.
- ceph: handle session flush message.
- ceph: hold on to exclusive caps on complete directories.
- ceph: implement readv/preadv for sync operation.
- ceph: improve readahead for file holes.
- ceph: improve reference tracking for snaprealm.
- ceph: include time stamp in every MDS request.
- ceph: include time stamp in replayed MDS requests.
- ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support.
- ceph: initialize inode before instantiating dentry.
- ceph: introduce a new inode flag indicating if cached dentries are ordered.
- ceph: introduce ceph_fill_fragtree().
- ceph: introduce global empty snap context.
- ceph: invalidate dirty pages after forced umount.
- ceph: keep i_snap_realm while there are writers.
- ceph: kstrdup() memory handling.
- ceph: let MDS adjust readdir 'frag'.
- ceph: make ceph_forget_all_cached_acls() static inline.
- ceph: make fsync() wait unsafe requests that created/modified inode.
- ceph: make sure syncfs flushes all cap snaps.
- ceph: make sure write caps are registered with auth MDS.
- ceph: match wait_for_completion_timeout return type.
- ceph: message versioning fixes.
- ceph: move ceph_find_inode() outside the s_mutex.
- ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks.
- ceph: no need to get parent inode in ceph_open.
- ceph: parse inline data in MClientReply and MClientCaps.
- ceph: pre-allocate ceph_cap struct for ceph_add_cap().
- ceph: pre-allocate data structure that tracks caps flushing.
- ceph: preallocate buffer for readdir reply.
- ceph: print inode number for LOOKUPINO request.
- ceph: properly apply umask when ACL is enabled.
- ceph: properly handle XATTR_CREATE and XATTR_REPLACE.
- ceph: properly mark empty directory as complete.
- ceph: properly release page upon error.
- ceph: properly zero data pages for file holes.
- ceph: provide seperate {inode,file}_operations for snapdir.
- ceph: queue cap release in __ceph_remove_cap().
- ceph: queue vmtruncate if necessary when handing cap grant/revoke.
- ceph: ratelimit warn messages for MDS closes session.
- ceph: re-send AIO write request when getting -EOLDSNAP error.
- ceph: re-send flushing caps (which are revoked) in reconnect stage.
- ceph: re-send requests when MDS enters reconnecting stage.
- ceph: refactor readpage_nounlock() to make the logic clearer.
- ceph: remember subtree root dirfrag's auth MDS.
- ceph: remove exported caps when handling cap import message.
- ceph: remove outdated frag information.
- ceph: remove redundant code for max file size verification.
- ceph: remove redundant declaration.
- ceph: remove redundant memset(0).
- ceph: remove redundant test of head->safe and silence static analysis warnings.
- ceph: remove the useless judgement.
- ceph: remove unused functions in ceph_frag.h.
- ceph: remove unused stringification macros.
- ceph: remove useless ACL check.
- ceph: remove xattr when null value is given to setxattr().
- ceph: rename snapshot support.
- ceph: replace comma with a semicolon.
- ceph: request xattrs if xattr_version is zero.
- ceph: reserve caps for file layout/lock MDS requests.
- ceph: reset r_resend_mds after receiving -ESTALE.
- ceph: return error for traceless reply race.
- ceph: rework dcache readdir.
- ceph: send TID of the oldest pending caps flush to MDS.
- ceph: send client metadata to MDS.
- ceph: set caps count after composing cap reconnect message.
- ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference.
- ceph: set mds_wanted when MDS reply changes a cap to auth cap.
- ceph: show nocephx_require_signatures and notcp_nodelay options.
- ceph: show non-default options only.
- ceph: simplify ceph_fh_to_dentry().
- ceph: simplify two mount_timeout sites.
- ceph: skip invalid dentry during dcache readdir.
- ceph: support inline data feature.
- ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL.
- ceph: sync read inline data.
- ceph: take snap_rwsem when accessing snap realm's cached_context.
- ceph: tolerate bad i_size for symlink inode (bsc#985232).
- ceph: track pending caps flushing accurately.
- ceph: track pending caps flushing globally.
- ceph: trim unused inodes before reconnecting to recovering MDS.
- ceph: trivial comment fix.
- ceph: update i_max_size even if inode version does not change.
- ceph: update inode fields according to issued caps.
- ceph: use %zu for len in ceph_fill_inline_data().
- ceph: use ceph_seq_cmp() to compare migrate_seq.
- ceph: use empty snap context for uninline_data and get_pool_perm.
- ceph: use fl->fl_file as owner identifier of flock and posix lock.
- ceph: use fl->fl_type to decide flock operation.
- ceph: use fpos_cmp() to compare dentry positions.
- ceph: use getattr request to fetch inline data.
- ceph: use i_size_{read,write} to get/set i_size.
- ceph: use msecs_to_jiffies for time conversion.
- ceph: use pagelist to present MDS request data.
- ceph: use truncate_pagecache() instead of truncate_inode_pages().
- ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure.
- client: include kernel version in client metadata.
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- crush: add chooseleaf_stable tunable.
- crush: decode and initialize chooseleaf_stable.
- crush: ensure bucket id is valid before indexing buckets array.
- crush: ensure take bucket value is valid.
- crush: fix crash from invalid 'take' argument.
- crush: sync up with userspace.
- crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).
- crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).
- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).
- drm/mgag200: Add support for a new rev of G200e (bsc#983904).
- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).
- drm/mgag200: remove unused variables (bsc#983904).
- drm: qxl: Workaround for buggy user-space (bsc#981344).
- efifb: Add support for 64-bit frame buffer addresses (bsc#973499).
- efifb: Fix 16 color palette entry calculation (bsc#983318).
- efifb: Fix KABI of screen_info struct (bsc#973499).
- ehci-pci: enable interrupt on BayTrail (bnc#947337).
- enic: set netdev->vlan_features (bsc#966245).
- fs/ceph/debugfs.c: replace seq_printf by seq_puts.
- fs/ceph: replace pr_warning by pr_warn.
- hid-elo: kill not flush the work (bnc#982354).
- hv: util: Pass the channel information during the init call (bnc#978527).
- hv: utils: Invoke the poll function after handshake (bnc#978527).
- hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().
- iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736).
- kabi/severities: Allow changes in zpci_* symbols (bsc#974692)
- kabi/severities: Whitelist libceph and rbd (bsc#964727).
- kabi/severities: Whitelist libceph and rbd.
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).
- kgraft/gfs2: Do not block livepatching in the log daemon for too long.
- kgraft/xen: Do not block livepatching in the XEN blkif kthread.
- libceph: Avoid holding the zero page on ceph_msgr_slab_init errors.
- libceph: Fix ceph_tcp_sendpage()'s more boolean usage.
- libceph: MOSDOpReply v7 encoding.
- libceph: Remove spurious kunmap() of the zero page.
- libceph: a couple tweaks for wait loops.
- libceph: add nocephx_sign_messages option.
- libceph: advertise support for TUNABLES5.
- libceph: advertise support for keepalive2.
- libceph: allow setting osd_req_op's flags.
- libceph: check data_len in ->alloc_msg().
- libceph: clear messenger auth_retry flag if we fault.
- libceph: clear msg->con in ceph_msg_release() only.
- libceph: do not access invalid memory in keepalive2 path.
- libceph: do not spam dmesg with stray reply warnings.
- libceph: drop authorizer check from cephx msg signing routines.
- libceph: evaluate osd_req_op_data() arguments only once.
- libceph: fix authorizer invalidation, take 2.
- libceph: fix ceph_msg_revoke().
- libceph: fix wrong name 'Ceph filesystem for Linux'.
- libceph: handle writefull for OSD op extent init (bsc#980706).
- libceph: introduce ceph_x_authorizer_cleanup().
- libceph: invalidate AUTH in addition to a service ticket.
- libceph: kill off ceph_x_ticket_handler::validity.
- libceph: move ceph_file_layout helpers to ceph_fs.h.
- libceph: msg signing callouts do not need con argument.
- libceph: nuke time_sub().
- libceph: properly release STAT request's raw_data_in.
- libceph: remove con argument in handle_reply().
- libceph: remove outdated comment.
- libceph: remove the unused macro AES_KEY_SIZE.
- libceph: rename con_work() to ceph_con_workfn().
- libceph: set 'exists' flag for newly up osd.
- libceph: stop duplicating client fields in messenger.
- libceph: store timeouts in jiffies, verify user input.
- libceph: treat sockaddr_storage with uninitialized family as blank.
- libceph: use keepalive2 to verify the mon session is alive.
- libceph: use list_for_each_entry_safe.
- libceph: use list_next_entry instead of list_entry_next.
- libceph: use local variable cursor instead of msg->cursor.
- libceph: use the right footer size when skipping a message.
- libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).
- md/raid56: Do not perform reads to support writes until stripe is ready.
- md/raid5: Ensure a batch member is not handled prematurely (bsc#953048).
- md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE.
- md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048).
- md/raid5: allow the stripe_cache to grow and shrink (bsc#953048).
- md/raid5: always set conf->prev_chunk_sectors and ->prev_algo (bsc#953048).
- md/raid5: avoid races when changing cache size (bsc#953048).
- md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048).
- md/raid5: be more selective about distributing flags across batch (bsc#953048).
- md/raid5: break stripe-batches when the array has failed (bsc#953048).
- md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048).
- md/raid5: change ->>inactive_blocked to a bit-flag (bsc#953048).
- md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048).
- md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048).
- md/raid5: close recently introduced race in stripe_head management.
- md/raid5: consider updating reshape_position at start of reshape (bsc#953048).
- md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048).
- md/raid5: do not do chunk aligned read on degraded array (bsc#953048).
- md/raid5: do not index beyond end of array in need_this_block() (bsc#953048).
- md/raid5: do not let shrink_slab shrink too far (bsc#953048).
- md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048).
- md/raid5: ensure device failure recorded before write request returns (bsc#953048).
- md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048).
- md/raid5: fix allocation of 'scribble' array (bsc#953048).
- md/raid5: fix another livelock caused by non-aligned writes (bsc#953048).
- md/raid5: fix handling of degraded stripes in batches (bsc#953048).
- md/raid5: fix init_stripe() inconsistencies (bsc#953048).
- md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048).
- md/raid5: fix newly-broken locking in get_active_stripe.
- md/raid5: handle possible race as reshape completes (bsc#953048).
- md/raid5: ignore released_stripes check (bsc#953048).
- md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048).
- md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048).
- md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048).
- md/raid5: need_this_block: tidy/fix last condition (bsc#953048).
- md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048).
- md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048).
- md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048).
- md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list.
- md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048).
- md/raid5: remove incorrect 'min_t()' when calculating writepos (bsc#953048).
- md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048).
- md/raid5: separate large if clause out of fetch_block() (bsc#953048).
- md/raid5: separate out the easy conditions in need_this_block (bsc#953048).
- md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048).
- md/raid5: strengthen check on reshape_position at run (bsc#953048).
- md/raid5: switch to use conf->chunk_sectors in place of mddev->chunk_sectors where possible (bsc#953048).
- md/raid5: use ->lock to protect accessing raid5 sysfs attributes (bsc#953048).
- md/raid5: use bio_list for the list of bios to return (bsc#953048).
- md: be careful when testing resync_max against curr_resync_completed (bsc#953048).
- md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048).
- md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048).
- md: remove unwanted white space from md.c (bsc#953048).
- md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048).
- mds: check cap ID when handling cap export message.
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mmc: sdhci: Allow for irq being shared (bnc#977582).
- mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).
- net: Start with correct mac_len in skb_network_protocol (bsc#968667).
- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).
- net: fix wrong mac_len calculation for vlans (bsc#968667).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- nvme: do not poll the CQ from the kthread (bsc#975788, bsc#965087).
- nvme: fix max_segments integer truncation (bsc#676471).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489).
- perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489).
- powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).
- powerpc/book3s64: Remove __end_handlers marker (bsc#976821).
- qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590).
- raid5: Retry R5_ReadNoMerge flag when hit a read error.
- raid5: add a new flag to track if a stripe can be batched (bsc#953048).
- raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048).
- raid5: avoid release list until last reference of the stripe (bsc#953048).
- raid5: batch adjacent full stripe write (bsc#953048).
- raid5: check faulty flag for array status during recovery (bsc#953048).
- raid5: check_reshape() shouldn't call mddev_suspend (bsc#953048).
- raid5: fix a race of stripe count check.
- raid5: fix broken async operation chain (bsc#953048).
- raid5: get_active_stripe avoids device_lock.
- raid5: handle expansion/resync case with stripe batching (bsc#953048).
- raid5: handle io error of batch list (bsc#953048).
- raid5: make_request does less prepare wait.
- raid5: relieve lock contention in get_active_stripe().
- raid5: relieve lock contention in get_active_stripe().
- raid5: revert e9e4c377e2f563 to fix a livelock (bsc#953048).
- raid5: speedup sync_request processing (bsc#953048).
- raid5: track overwrite disk count (bsc#953048).
- raid5: update analysis state for failed stripe (bsc#953048).
- raid5: use flex_array for scribble data (bsc#953048).
- rbd: bump queue_max_segments.
- rbd: delete an unnecessary check before rbd_dev_destroy().
- rbd: do not free rbd_dev outside of the release callback.
- rbd: do not put snap_context twice in rbd_queue_workfn().
- rbd: drop null test before destroy functions.
- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).
- rbd: plug rbd_dev->header.object_prefix memory leak.
- rbd: rbd_wq comment is obsolete.
- rbd: remove duplicate calls to rbd_dev_mapping_clear().
- rbd: report unsupported features to syslog (bsc#979169).
- rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails.
- rbd: set device_type::release instead of device::release.
- rbd: set max_sectors explicitly.
- rbd: store rbd_options in rbd_device.
- rbd: terminate rbd_opts_tokens with Opt_err.
- rbd: timeout watch teardown on unmap with mount_timeout.
- rbd: use writefull op for object size writes.
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.
- s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736).
- s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736).
- s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736).
- s390/3270: fix view reference counting (bnc#979922, LTC#141736).
- s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736).
- s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456).
- s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).
- s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).
- s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).
- s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#974692, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).
- s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106).
- s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138).
- sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521).
- sb_edac: Fix support for systems with two home agents per socket (bsc#979521).
- sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521).
- sb_edac: look harder for DDRIO on Haswell systems (bsc#979521).
- sb_edac: support for Broadwell -EP and -EX (bsc#979521).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched/x86: Fix up typo in topology detection (bsc#974165).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- scsi-bnx2fc-handle_scsi_retry_delay
- scsi-bnx2fc-soft_lockup_when_rmmod
- scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).
- sd: get disk reference in sd_check_events() (bnc#897662).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
- usb: quirk to stop runtime PM for Intel 7260 (bnc#984456).
- vgaarb: Add more context to error messages (bsc#976868).
- wait: introduce wait_event_exclusive_cmd (bsc#953048).
- x86 EDAC, sb_edac.c: Repair damage introduced when 'fixing' channel address (bsc#979521).
- x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521).
- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).
- x86/efi: parse_efi_setup() build fix (bsc#979485).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- x86: standardize mmap_rnd() usage (bnc#974308).
- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
Patchnames
SUSE-SLE-RT-12-SP1-2016-1133
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.61 to receive various security and bugfixes.\n\nMain feature additions:\n- Improved support for Clustered File System (CephFS, fate#318586).\n\nThe following security bugs were fixed:\n- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).\n- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).\n- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka 'Linux pciback missing sanity checks (bnc#957990).\n- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka 'Linux pciback missing sanity checks (bnc#957990).\n- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).\n- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).\n- CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n\nThe following non-security bugs were fixed:\n- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).\n- Add wait_event_cmd() (bsc#953048).\n- Btrfs: be more precise on errors when getting an inode from disk (bsc#981038).\n- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).\n- Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).\n- Btrfs: do not use src fd for printk (bsc#980348).\n- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).\n- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).\n- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).\n- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).\n- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).\n- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).\n- Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).\n- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).\n- Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844).\n- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).\n- CacheFiles: Handle object being killed before being set up (bsc#971049).\n- EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521).\n- EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521).\n- EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521).\n- EDAC/sb_edac: Fix computation of channel address (bsc#979521).\n- EDAC: Correct channel count limit (bsc#979521).\n- EDAC: Remove arbitrary limit on number of channels (bsc#979521).\n- EDAC: Use static attribute groups for managing sysfs entries (bsc#979521).\n- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).\n- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).\n- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).\n- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).\n- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).\n- FS-Cache: Out of line fscache_operation_init() (bsc#971049).\n- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).\n- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).\n- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).\n- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).\n- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).\n- FS-Cache: Timeout for releasepage() (bsc#971049).\n- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).\n- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).\n- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- Fix kabi issue (bsc#971049).\n- Input: i8042 - lower log level for 'no controller' message (bsc#945345).\n- KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770).\n- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).\n- NVMe: Unify controller probe and resume (bsc#979347).\n- NVMe: init nvme queue before enabling irq (bsc#662458).\n- PCI/AER: Clear error status registers during enumeration and restore (bsc#985978).\n- Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with head exceeding page size (bsc#978469).\n- Revert 'scsi: fix soft lockup in scsi_remove_target() on module removal' (bsc#970609).\n- SCSI: Increase REPORT_LUNS timeout (bsc#982282).\n- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).\n- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.\n- Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece.\n- Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570).\n- Use mainline variant of hyperv KVP IP failover patch (bnc#978527)\n- VSOCK: Fix lockdep issue (bsc#977417).\n- VSOCK: sock_put wasn't safe to call in interrupt context (bsc#977417).\n- Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).\n- base: make module_create_drivers_dir race-free (bnc#983977).\n- block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124).\n- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).\n- cdc_ncm: workaround for EM7455 'silent' data interface (bnc#988552).\n- ceph fscache: Introduce a routine for uncaching single no data page from fscache.\n- ceph fscache: Uncaching no data page from fscache in readpage().\n- ceph: Asynchronous IO support.\n- ceph: Avoid to propagate the invalid page point.\n- ceph: Clean up if error occurred in finish_read().\n- ceph: EIO all operations after forced umount.\n- ceph: Implement writev/pwritev for sync operation.\n- ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n- ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n- ceph: add acl for cephfs.\n- ceph: add acl, noacl options for cephfs mount.\n- ceph: add get_name() NFS export callback.\n- ceph: add get_parent() NFS export callback.\n- ceph: add imported caps when handling cap export message.\n- ceph: add inline data to pagecache.\n- ceph: add missing init_acl() for mkdir() and atomic_open().\n- ceph: add open export target session helper.\n- ceph: add request to i_unsafe_dirops when getting unsafe reply.\n- ceph: additional debugfs output.\n- ceph: always re-send cap flushes when MDS recovers.\n- ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps).\n- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions).\n- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync).\n- ceph: avoid releasing caps that are being used.\n- ceph: avoid sending unnessesary FLUSHSNAP message.\n- ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename().\n- ceph: cast PAGE_SIZE to size_t in ceph_sync_write().\n- ceph: ceph_frag_contains_value can be boolean.\n- ceph: ceph_get_parent() can be static.\n- ceph: check OSD caps before read/write.\n- ceph: check buffer size in ceph_vxattrcb_layout().\n- ceph: check caps in filemap_fault and page_mkwrite.\n- ceph: check directory's completeness before emitting directory entry.\n- ceph: check inode caps in ceph_d_revalidate.\n- ceph: check unsupported fallocate mode.\n- ceph: check zero length in ceph_sync_read().\n- ceph: checking for IS_ERR instead of NULL.\n- ceph: cleanup unsafe requests when reconnecting is denied.\n- ceph: cleanup use of ceph_msg_get.\n- ceph: clear directory's completeness when creating file.\n- ceph: convert inline data to normal data before data write.\n- ceph: do not assume r_old_dentry[_dir] always set together.\n- ceph: do not chain inode updates to parent fsync.\n- ceph: do not grabs open file reference for aborted request.\n- ceph: do not include ceph.{file,dir}.layout vxattr in listxattr().\n- ceph: do not include used caps in cap_wanted.\n- ceph: do not invalidate page cache when inode is no longer used.\n- ceph: do not mark dirty caps when there is no auth cap.\n- ceph: do not pre-allocate space for cap release messages.\n- ceph: do not set r_old_dentry_dir on link().\n- ceph: do not trim auth cap when there are cap snaps.\n- ceph: do not zero i_wrbuffer_ref when reconnecting is denied.\n- ceph: drop cap releases in requests composed before cap reconnect.\n- ceph: drop extra open file reference in ceph_atomic_open().\n- ceph: drop unconnected inodes.\n- ceph: exclude setfilelock requests when calculating oldest tid.\n- ceph: export ceph_session_state_name function.\n- ceph: fetch inline data when getting Fcr cap refs.\n- ceph: fix __dcache_readdir().\n- ceph: fix a comment typo.\n- ceph: fix append mode write.\n- ceph: fix atomic_open snapdir.\n- ceph: fix bool assignments.\n- ceph: fix cache revoke race.\n- ceph: fix ceph_dir_llseek().\n- ceph: fix ceph_fh_to_parent().\n- ceph: fix ceph_removexattr().\n- ceph: fix ceph_set_acl().\n- ceph: fix ceph_writepages_start().\n- ceph: fix dcache/nocache mount option.\n- ceph: fix dentry leaks.\n- ceph: fix directory fsync.\n- ceph: fix divide-by-zero in __validate_layout().\n- ceph: fix double page_unlock() in page_mkwrite().\n- ceph: fix dout() compile warnings in ceph_filemap_fault().\n- ceph: fix file lock interruption.\n- ceph: fix flush tid comparision.\n- ceph: fix flushing caps.\n- ceph: fix llistxattr on symlink.\n- ceph: fix message length computation.\n- ceph: fix mksnap crash.\n- ceph: fix null pointer dereference in send_mds_reconnect().\n- ceph: fix pr_fmt() redefinition.\n- ceph: fix queuing inode to mdsdir's snaprealm.\n- ceph: fix reading inline data when i_size greater than PAGE_SIZE.\n- ceph: fix request time stamp encoding.\n- ceph: fix reset_readdir().\n- ceph: fix setting empty extended attribute.\n- ceph: fix sizeof(struct tYpO *) typo.\n- ceph: fix snap context leak in error path.\n- ceph: fix trim caps.\n- ceph: fix uninline data function.\n- ceph: flush cap release queue when trimming session caps.\n- ceph: flush inline version.\n- ceph: forbid mandatory file lock.\n- ceph: fscache: Update object store limit after file writing.\n- ceph: fscache: Wait for completion of object initialization.\n- ceph: fscache: add an interface to synchronize object store limit.\n- ceph: get inode size for each append write.\n- ceph: handle -ESTALE reply.\n- ceph: handle SESSION_FORCE_RO message.\n- ceph: handle cap export race in try_flush_caps().\n- ceph: handle cap import atomically.\n- ceph: handle frag mismatch between readdir request and reply.\n- ceph: handle race between cap reconnect and cap release.\n- ceph: handle session flush message.\n- ceph: hold on to exclusive caps on complete directories.\n- ceph: implement readv/preadv for sync operation.\n- ceph: improve readahead for file holes.\n- ceph: improve reference tracking for snaprealm.\n- ceph: include time stamp in every MDS request.\n- ceph: include time stamp in replayed MDS requests.\n- ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support.\n- ceph: initialize inode before instantiating dentry.\n- ceph: introduce a new inode flag indicating if cached dentries are ordered.\n- ceph: introduce ceph_fill_fragtree().\n- ceph: introduce global empty snap context.\n- ceph: invalidate dirty pages after forced umount.\n- ceph: keep i_snap_realm while there are writers.\n- ceph: kstrdup() memory handling.\n- ceph: let MDS adjust readdir 'frag'.\n- ceph: make ceph_forget_all_cached_acls() static inline.\n- ceph: make fsync() wait unsafe requests that created/modified inode.\n- ceph: make sure syncfs flushes all cap snaps.\n- ceph: make sure write caps are registered with auth MDS.\n- ceph: match wait_for_completion_timeout return type.\n- ceph: message versioning fixes.\n- ceph: move ceph_find_inode() outside the s_mutex.\n- ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks.\n- ceph: no need to get parent inode in ceph_open.\n- ceph: parse inline data in MClientReply and MClientCaps.\n- ceph: pre-allocate ceph_cap struct for ceph_add_cap().\n- ceph: pre-allocate data structure that tracks caps flushing.\n- ceph: preallocate buffer for readdir reply.\n- ceph: print inode number for LOOKUPINO request.\n- ceph: properly apply umask when ACL is enabled.\n- ceph: properly handle XATTR_CREATE and XATTR_REPLACE.\n- ceph: properly mark empty directory as complete.\n- ceph: properly release page upon error.\n- ceph: properly zero data pages for file holes.\n- ceph: provide seperate {inode,file}_operations for snapdir.\n- ceph: queue cap release in __ceph_remove_cap().\n- ceph: queue vmtruncate if necessary when handing cap grant/revoke.\n- ceph: ratelimit warn messages for MDS closes session.\n- ceph: re-send AIO write request when getting -EOLDSNAP error.\n- ceph: re-send flushing caps (which are revoked) in reconnect stage.\n- ceph: re-send requests when MDS enters reconnecting stage.\n- ceph: refactor readpage_nounlock() to make the logic clearer.\n- ceph: remember subtree root dirfrag's auth MDS.\n- ceph: remove exported caps when handling cap import message.\n- ceph: remove outdated frag information.\n- ceph: remove redundant code for max file size verification.\n- ceph: remove redundant declaration.\n- ceph: remove redundant memset(0).\n- ceph: remove redundant test of head->safe and silence static analysis warnings.\n- ceph: remove the useless judgement.\n- ceph: remove unused functions in ceph_frag.h.\n- ceph: remove unused stringification macros.\n- ceph: remove useless ACL check.\n- ceph: remove xattr when null value is given to setxattr().\n- ceph: rename snapshot support.\n- ceph: replace comma with a semicolon.\n- ceph: request xattrs if xattr_version is zero.\n- ceph: reserve caps for file layout/lock MDS requests.\n- ceph: reset r_resend_mds after receiving -ESTALE.\n- ceph: return error for traceless reply race.\n- ceph: rework dcache readdir.\n- ceph: send TID of the oldest pending caps flush to MDS.\n- ceph: send client metadata to MDS.\n- ceph: set caps count after composing cap reconnect message.\n- ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference.\n- ceph: set mds_wanted when MDS reply changes a cap to auth cap.\n- ceph: show nocephx_require_signatures and notcp_nodelay options.\n- ceph: show non-default options only.\n- ceph: simplify ceph_fh_to_dentry().\n- ceph: simplify two mount_timeout sites.\n- ceph: skip invalid dentry during dcache readdir.\n- ceph: support inline data feature.\n- ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL.\n- ceph: sync read inline data.\n- ceph: take snap_rwsem when accessing snap realm's cached_context.\n- ceph: tolerate bad i_size for symlink inode (bsc#985232).\n- ceph: track pending caps flushing accurately.\n- ceph: track pending caps flushing globally.\n- ceph: trim unused inodes before reconnecting to recovering MDS.\n- ceph: trivial comment fix.\n- ceph: update i_max_size even if inode version does not change.\n- ceph: update inode fields according to issued caps.\n- ceph: use %zu for len in ceph_fill_inline_data().\n- ceph: use ceph_seq_cmp() to compare migrate_seq.\n- ceph: use empty snap context for uninline_data and get_pool_perm.\n- ceph: use fl->fl_file as owner identifier of flock and posix lock.\n- ceph: use fl->fl_type to decide flock operation.\n- ceph: use fpos_cmp() to compare dentry positions.\n- ceph: use getattr request to fetch inline data.\n- ceph: use i_size_{read,write} to get/set i_size.\n- ceph: use msecs_to_jiffies for time conversion.\n- ceph: use pagelist to present MDS request data.\n- ceph: use truncate_pagecache() instead of truncate_inode_pages().\n- ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure.\n- client: include kernel version in client metadata.\n- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).\n- crush: add chooseleaf_stable tunable.\n- crush: decode and initialize chooseleaf_stable.\n- crush: ensure bucket id is valid before indexing buckets array.\n- crush: ensure take bucket value is valid.\n- crush: fix crash from invalid 'take' argument.\n- crush: sync up with userspace.\n- crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).\n- crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).\n- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).\n- drm/mgag200: Add support for a new rev of G200e (bsc#983904).\n- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).\n- drm/mgag200: remove unused variables (bsc#983904).\n- drm: qxl: Workaround for buggy user-space (bsc#981344).\n- efifb: Add support for 64-bit frame buffer addresses (bsc#973499).\n- efifb: Fix 16 color palette entry calculation (bsc#983318).\n- efifb: Fix KABI of screen_info struct (bsc#973499).\n- ehci-pci: enable interrupt on BayTrail (bnc#947337).\n- enic: set netdev->vlan_features (bsc#966245).\n- fs/ceph/debugfs.c: replace seq_printf by seq_puts.\n- fs/ceph: replace pr_warning by pr_warn.\n- hid-elo: kill not flush the work (bnc#982354).\n- hv: util: Pass the channel information during the init call (bnc#978527).\n- hv: utils: Invoke the poll function after handshake (bnc#978527).\n- hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().\n- iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736).\n- kabi/severities: Allow changes in zpci_* symbols (bsc#974692)\n- kabi/severities: Whitelist libceph and rbd (bsc#964727).\n- kabi/severities: Whitelist libceph and rbd.\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).\n- kgraft/gfs2: Do not block livepatching in the log daemon for too long.\n- kgraft/xen: Do not block livepatching in the XEN blkif kthread.\n- libceph: Avoid holding the zero page on ceph_msgr_slab_init errors.\n- libceph: Fix ceph_tcp_sendpage()'s more boolean usage.\n- libceph: MOSDOpReply v7 encoding.\n- libceph: Remove spurious kunmap() of the zero page.\n- libceph: a couple tweaks for wait loops.\n- libceph: add nocephx_sign_messages option.\n- libceph: advertise support for TUNABLES5.\n- libceph: advertise support for keepalive2.\n- libceph: allow setting osd_req_op's flags.\n- libceph: check data_len in ->alloc_msg().\n- libceph: clear messenger auth_retry flag if we fault.\n- libceph: clear msg->con in ceph_msg_release() only.\n- libceph: do not access invalid memory in keepalive2 path.\n- libceph: do not spam dmesg with stray reply warnings.\n- libceph: drop authorizer check from cephx msg signing routines.\n- libceph: evaluate osd_req_op_data() arguments only once.\n- libceph: fix authorizer invalidation, take 2.\n- libceph: fix ceph_msg_revoke().\n- libceph: fix wrong name 'Ceph filesystem for Linux'.\n- libceph: handle writefull for OSD op extent init (bsc#980706).\n- libceph: introduce ceph_x_authorizer_cleanup().\n- libceph: invalidate AUTH in addition to a service ticket.\n- libceph: kill off ceph_x_ticket_handler::validity.\n- libceph: move ceph_file_layout helpers to ceph_fs.h.\n- libceph: msg signing callouts do not need con argument.\n- libceph: nuke time_sub().\n- libceph: properly release STAT request's raw_data_in.\n- libceph: remove con argument in handle_reply().\n- libceph: remove outdated comment.\n- libceph: remove the unused macro AES_KEY_SIZE.\n- libceph: rename con_work() to ceph_con_workfn().\n- libceph: set 'exists' flag for newly up osd.\n- libceph: stop duplicating client fields in messenger.\n- libceph: store timeouts in jiffies, verify user input.\n- libceph: treat sockaddr_storage with uninitialized family as blank.\n- libceph: use keepalive2 to verify the mon session is alive.\n- libceph: use list_for_each_entry_safe.\n- libceph: use list_next_entry instead of list_entry_next.\n- libceph: use local variable cursor instead of msg->cursor.\n- libceph: use the right footer size when skipping a message.\n- libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).\n- md/raid56: Do not perform reads to support writes until stripe is ready.\n- md/raid5: Ensure a batch member is not handled prematurely (bsc#953048).\n- md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE.\n- md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048).\n- md/raid5: allow the stripe_cache to grow and shrink (bsc#953048).\n- md/raid5: always set conf->prev_chunk_sectors and ->prev_algo (bsc#953048).\n- md/raid5: avoid races when changing cache size (bsc#953048).\n- md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048).\n- md/raid5: be more selective about distributing flags across batch (bsc#953048).\n- md/raid5: break stripe-batches when the array has failed (bsc#953048).\n- md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048).\n- md/raid5: change ->>inactive_blocked to a bit-flag (bsc#953048).\n- md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048).\n- md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048).\n- md/raid5: close recently introduced race in stripe_head management.\n- md/raid5: consider updating reshape_position at start of reshape (bsc#953048).\n- md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048).\n- md/raid5: do not do chunk aligned read on degraded array (bsc#953048).\n- md/raid5: do not index beyond end of array in need_this_block() (bsc#953048).\n- md/raid5: do not let shrink_slab shrink too far (bsc#953048).\n- md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048).\n- md/raid5: ensure device failure recorded before write request returns (bsc#953048).\n- md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048).\n- md/raid5: fix allocation of 'scribble' array (bsc#953048).\n- md/raid5: fix another livelock caused by non-aligned writes (bsc#953048).\n- md/raid5: fix handling of degraded stripes in batches (bsc#953048).\n- md/raid5: fix init_stripe() inconsistencies (bsc#953048).\n- md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048).\n- md/raid5: fix newly-broken locking in get_active_stripe.\n- md/raid5: handle possible race as reshape completes (bsc#953048).\n- md/raid5: ignore released_stripes check (bsc#953048).\n- md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048).\n- md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048).\n- md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048).\n- md/raid5: need_this_block: tidy/fix last condition (bsc#953048).\n- md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048).\n- md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048).\n- md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048).\n- md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list.\n- md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048).\n- md/raid5: remove incorrect 'min_t()' when calculating writepos (bsc#953048).\n- md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048).\n- md/raid5: separate large if clause out of fetch_block() (bsc#953048).\n- md/raid5: separate out the easy conditions in need_this_block (bsc#953048).\n- md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048).\n- md/raid5: strengthen check on reshape_position at run (bsc#953048).\n- md/raid5: switch to use conf->chunk_sectors in place of mddev->chunk_sectors where possible (bsc#953048).\n- md/raid5: use ->lock to protect accessing raid5 sysfs attributes (bsc#953048).\n- md/raid5: use bio_list for the list of bios to return (bsc#953048).\n- md: be careful when testing resync_max against curr_resync_completed (bsc#953048).\n- md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048).\n- md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048).\n- md: remove unwanted white space from md.c (bsc#953048).\n- md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048).\n- mds: check cap ID when handling cap export message.\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- mmc: sdhci: Allow for irq being shared (bnc#977582).\n- mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).\n- net/qlge: Avoids recursive EEH error (bsc#954847).\n- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).\n- net: Start with correct mac_len in skb_network_protocol (bsc#968667).\n- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).\n- net: fix wrong mac_len calculation for vlans (bsc#968667).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- nvme: do not poll the CQ from the kthread (bsc#975788, bsc#965087).\n- nvme: fix max_segments integer truncation (bsc#676471).\n- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).\n- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).\n- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).\n- perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489).\n- perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489).\n- powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).\n- powerpc/book3s64: Remove __end_handlers marker (bsc#976821).\n- qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590).\n- raid5: Retry R5_ReadNoMerge flag when hit a read error.\n- raid5: add a new flag to track if a stripe can be batched (bsc#953048).\n- raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048).\n- raid5: avoid release list until last reference of the stripe (bsc#953048).\n- raid5: batch adjacent full stripe write (bsc#953048).\n- raid5: check faulty flag for array status during recovery (bsc#953048).\n- raid5: check_reshape() shouldn't call mddev_suspend (bsc#953048).\n- raid5: fix a race of stripe count check.\n- raid5: fix broken async operation chain (bsc#953048).\n- raid5: get_active_stripe avoids device_lock.\n- raid5: handle expansion/resync case with stripe batching (bsc#953048).\n- raid5: handle io error of batch list (bsc#953048).\n- raid5: make_request does less prepare wait.\n- raid5: relieve lock contention in get_active_stripe().\n- raid5: relieve lock contention in get_active_stripe().\n- raid5: revert e9e4c377e2f563 to fix a livelock (bsc#953048).\n- raid5: speedup sync_request processing (bsc#953048).\n- raid5: track overwrite disk count (bsc#953048).\n- raid5: update analysis state for failed stripe (bsc#953048).\n- raid5: use flex_array for scribble data (bsc#953048).\n- rbd: bump queue_max_segments.\n- rbd: delete an unnecessary check before rbd_dev_destroy().\n- rbd: do not free rbd_dev outside of the release callback.\n- rbd: do not put snap_context twice in rbd_queue_workfn().\n- rbd: drop null test before destroy functions.\n- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).\n- rbd: plug rbd_dev->header.object_prefix memory leak.\n- rbd: rbd_wq comment is obsolete.\n- rbd: remove duplicate calls to rbd_dev_mapping_clear().\n- rbd: report unsupported features to syslog (bsc#979169).\n- rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails.\n- rbd: set device_type::release instead of device::release.\n- rbd: set max_sectors explicitly.\n- rbd: store rbd_options in rbd_device.\n- rbd: terminate rbd_opts_tokens with Opt_err.\n- rbd: timeout watch teardown on unmap with mount_timeout.\n- rbd: use writefull op for object size writes.\n- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.\n- s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736).\n- s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736).\n- s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736).\n- s390/3270: fix view reference counting (bnc#979922, LTC#141736).\n- s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736).\n- s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456).\n- s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).\n- s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).\n- s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).\n- s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).\n- s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#974692, LTC#139401).\n- s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).\n- s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).\n- s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).\n- s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106).\n- s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138).\n- sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521).\n- sb_edac: Fix support for systems with two home agents per socket (bsc#979521).\n- sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521).\n- sb_edac: look harder for DDRIO on Haswell systems (bsc#979521).\n- sb_edac: support for Broadwell -EP and -EX (bsc#979521).\n- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).\n- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).\n- sched/x86: Fix up typo in topology detection (bsc#974165).\n- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).\n- scsi-bnx2fc-handle_scsi_retry_delay\n- scsi-bnx2fc-soft_lockup_when_rmmod\n- scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).\n- sd: get disk reference in sd_check_events() (bnc#897662).\n- target/rbd: do not put snap_context twice (bsc#981143).\n- target/rbd: do not put snap_context twice (bsc#981143).\n- target/rbd: remove caw_mutex usage (bsc#981143).\n- target/rbd: remove caw_mutex usage (bsc#981143).\n- usb: quirk to stop runtime PM for Intel 7260 (bnc#984456).\n- vgaarb: Add more context to error messages (bsc#976868).\n- wait: introduce wait_event_exclusive_cmd (bsc#953048).\n- x86 EDAC, sb_edac.c: Repair damage introduced when 'fixing' channel address (bsc#979521).\n- x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521).\n- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).\n- x86/efi: parse_efi_setup() build fix (bsc#979485).\n- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- x86: standardize mmap_rnd() usage (bnc#974308).\n- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).\n- xfs: fix premature enospc on inode allocation (bsc#984148).\n- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).\n- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-RT-12-SP1-2016-1133", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1937-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:1937-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20161937-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:1937-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html", }, { category: "self", summary: "SUSE Bug 662458", url: "https://bugzilla.suse.com/662458", }, { category: "self", summary: "SUSE Bug 676471", url: "https://bugzilla.suse.com/676471", }, { category: "self", summary: "SUSE Bug 897662", url: "https://bugzilla.suse.com/897662", }, { category: "self", summary: "SUSE Bug 928547", url: "https://bugzilla.suse.com/928547", }, { category: "self", summary: "SUSE Bug 944309", url: "https://bugzilla.suse.com/944309", }, { category: "self", summary: "SUSE Bug 945345", url: "https://bugzilla.suse.com/945345", }, { category: "self", summary: "SUSE Bug 947337", url: "https://bugzilla.suse.com/947337", }, { category: "self", summary: "SUSE Bug 950998", url: "https://bugzilla.suse.com/950998", }, { category: "self", summary: "SUSE Bug 951844", url: "https://bugzilla.suse.com/951844", }, { category: "self", summary: "SUSE Bug 953048", url: "https://bugzilla.suse.com/953048", }, { category: "self", summary: "SUSE Bug 953233", url: "https://bugzilla.suse.com/953233", }, { category: "self", summary: "SUSE Bug 954847", url: "https://bugzilla.suse.com/954847", }, { category: "self", summary: "SUSE Bug 956491", url: "https://bugzilla.suse.com/956491", }, { category: "self", summary: "SUSE Bug 957805", url: "https://bugzilla.suse.com/957805", }, { category: "self", summary: "SUSE Bug 957986", url: "https://bugzilla.suse.com/957986", }, { category: "self", summary: "SUSE Bug 957990", url: "https://bugzilla.suse.com/957990", }, { category: "self", summary: "SUSE Bug 958390", url: "https://bugzilla.suse.com/958390", }, { category: "self", summary: "SUSE Bug 958463", url: "https://bugzilla.suse.com/958463", }, { category: "self", summary: "SUSE Bug 960857", url: "https://bugzilla.suse.com/960857", }, { category: "self", summary: "SUSE Bug 962742", url: "https://bugzilla.suse.com/962742", }, { category: "self", summary: "SUSE Bug 962846", url: "https://bugzilla.suse.com/962846", }, { category: "self", summary: "SUSE Bug 963762", url: "https://bugzilla.suse.com/963762", }, { category: "self", summary: "SUSE Bug 964727", url: "https://bugzilla.suse.com/964727", }, { category: "self", summary: "SUSE Bug 965087", url: "https://bugzilla.suse.com/965087", }, { category: "self", summary: "SUSE Bug 966245", url: "https://bugzilla.suse.com/966245", }, { category: "self", summary: "SUSE Bug 967640", url: "https://bugzilla.suse.com/967640", }, { category: "self", summary: "SUSE Bug 968667", url: "https://bugzilla.suse.com/968667", }, { category: "self", summary: "SUSE Bug 969016", url: "https://bugzilla.suse.com/969016", }, { category: "self", summary: "SUSE Bug 970114", url: "https://bugzilla.suse.com/970114", }, { category: "self", summary: "SUSE Bug 970506", url: "https://bugzilla.suse.com/970506", }, { category: "self", summary: "SUSE Bug 970604", url: "https://bugzilla.suse.com/970604", }, { category: "self", summary: "SUSE Bug 970609", url: "https://bugzilla.suse.com/970609", }, { category: "self", summary: "SUSE Bug 970948", url: "https://bugzilla.suse.com/970948", }, { category: "self", summary: "SUSE Bug 971049", url: "https://bugzilla.suse.com/971049", }, { category: "self", summary: "SUSE Bug 971770", url: "https://bugzilla.suse.com/971770", }, { category: "self", summary: "SUSE Bug 971947", url: "https://bugzilla.suse.com/971947", }, { category: "self", summary: "SUSE Bug 972124", url: "https://bugzilla.suse.com/972124", }, { category: "self", summary: "SUSE Bug 972933", url: "https://bugzilla.suse.com/972933", }, { category: "self", summary: "SUSE Bug 973378", url: "https://bugzilla.suse.com/973378", }, { category: "self", summary: "SUSE Bug 973499", url: "https://bugzilla.suse.com/973499", }, { category: "self", summary: "SUSE Bug 973570", url: "https://bugzilla.suse.com/973570", }, { category: "self", summary: "SUSE Bug 974165", url: "https://bugzilla.suse.com/974165", }, { category: "self", summary: "SUSE Bug 974308", url: "https://bugzilla.suse.com/974308", }, { category: "self", summary: "SUSE Bug 974620", url: "https://bugzilla.suse.com/974620", }, { category: "self", summary: "SUSE Bug 974646", url: "https://bugzilla.suse.com/974646", }, { category: "self", summary: "SUSE Bug 974692", url: "https://bugzilla.suse.com/974692", }, { category: "self", summary: "SUSE Bug 975533", url: "https://bugzilla.suse.com/975533", }, { category: "self", summary: "SUSE Bug 975772", url: "https://bugzilla.suse.com/975772", }, { category: "self", summary: "SUSE Bug 975788", url: "https://bugzilla.suse.com/975788", }, { category: "self", summary: "SUSE Bug 976739", url: "https://bugzilla.suse.com/976739", }, { category: "self", summary: "SUSE Bug 976821", url: "https://bugzilla.suse.com/976821", }, { category: "self", summary: "SUSE Bug 976868", url: "https://bugzilla.suse.com/976868", }, { category: "self", summary: "SUSE Bug 977417", url: "https://bugzilla.suse.com/977417", }, { category: "self", summary: "SUSE Bug 977582", url: "https://bugzilla.suse.com/977582", }, { category: "self", summary: "SUSE Bug 977685", url: "https://bugzilla.suse.com/977685", }, { category: "self", summary: "SUSE Bug 978401", url: "https://bugzilla.suse.com/978401", }, { category: "self", summary: "SUSE Bug 978469", url: "https://bugzilla.suse.com/978469", }, { category: "self", summary: "SUSE Bug 978527", url: "https://bugzilla.suse.com/978527", }, { category: "self", summary: "SUSE Bug 978822", url: "https://bugzilla.suse.com/978822", }, { category: "self", summary: "SUSE Bug 979169", url: "https://bugzilla.suse.com/979169", }, { category: "self", summary: "SUSE Bug 979213", url: "https://bugzilla.suse.com/979213", }, { category: "self", summary: "SUSE Bug 979347", url: "https://bugzilla.suse.com/979347", }, { category: "self", summary: "SUSE Bug 979419", url: "https://bugzilla.suse.com/979419", }, { category: "self", summary: "SUSE Bug 979485", url: "https://bugzilla.suse.com/979485", }, { category: "self", summary: "SUSE Bug 979489", url: "https://bugzilla.suse.com/979489", }, { category: "self", summary: "SUSE Bug 979521", url: "https://bugzilla.suse.com/979521", }, { category: "self", summary: "SUSE Bug 979548", url: "https://bugzilla.suse.com/979548", }, { category: "self", summary: "SUSE Bug 979867", url: "https://bugzilla.suse.com/979867", }, { category: "self", summary: "SUSE Bug 979879", url: "https://bugzilla.suse.com/979879", }, { category: "self", summary: "SUSE Bug 979922", url: "https://bugzilla.suse.com/979922", }, { category: "self", summary: "SUSE Bug 980246", url: "https://bugzilla.suse.com/980246", }, { category: "self", summary: "SUSE Bug 980348", url: "https://bugzilla.suse.com/980348", }, { category: "self", summary: "SUSE Bug 980371", url: "https://bugzilla.suse.com/980371", }, { category: "self", summary: "SUSE Bug 980706", url: "https://bugzilla.suse.com/980706", }, { category: "self", summary: "SUSE Bug 981038", url: "https://bugzilla.suse.com/981038", }, { category: "self", summary: "SUSE Bug 981143", url: "https://bugzilla.suse.com/981143", }, { category: "self", summary: "SUSE Bug 981344", url: "https://bugzilla.suse.com/981344", }, { category: "self", summary: "SUSE Bug 982282", url: "https://bugzilla.suse.com/982282", }, { category: "self", summary: "SUSE Bug 982354", url: "https://bugzilla.suse.com/982354", }, { category: "self", summary: "SUSE Bug 982544", url: "https://bugzilla.suse.com/982544", }, { category: "self", summary: "SUSE Bug 982698", url: "https://bugzilla.suse.com/982698", }, { category: "self", summary: "SUSE Bug 983143", url: "https://bugzilla.suse.com/983143", }, { category: "self", summary: "SUSE Bug 983213", url: "https://bugzilla.suse.com/983213", }, { category: "self", summary: "SUSE Bug 983318", url: "https://bugzilla.suse.com/983318", }, { category: "self", summary: "SUSE Bug 983394", url: "https://bugzilla.suse.com/983394", }, { category: "self", summary: "SUSE Bug 983721", url: "https://bugzilla.suse.com/983721", }, { category: "self", summary: "SUSE Bug 983904", url: "https://bugzilla.suse.com/983904", }, { category: "self", summary: "SUSE Bug 983977", url: "https://bugzilla.suse.com/983977", }, { category: "self", summary: "SUSE Bug 984148", url: "https://bugzilla.suse.com/984148", }, { category: "self", summary: "SUSE Bug 984456", url: "https://bugzilla.suse.com/984456", }, { category: "self", summary: "SUSE Bug 984755", url: "https://bugzilla.suse.com/984755", }, { category: "self", summary: "SUSE Bug 985232", url: "https://bugzilla.suse.com/985232", }, { category: "self", summary: "SUSE Bug 985978", url: "https://bugzilla.suse.com/985978", }, { category: "self", summary: "SUSE Bug 986362", url: "https://bugzilla.suse.com/986362", }, { category: "self", summary: "SUSE Bug 986569", url: "https://bugzilla.suse.com/986569", }, { category: "self", summary: "SUSE Bug 986572", url: "https://bugzilla.suse.com/986572", }, { category: "self", summary: "SUSE Bug 986811", url: "https://bugzilla.suse.com/986811", }, { category: "self", summary: "SUSE Bug 988215", url: "https://bugzilla.suse.com/988215", }, { category: "self", summary: "SUSE Bug 988498", url: "https://bugzilla.suse.com/988498", }, { category: "self", summary: "SUSE Bug 988552", url: "https://bugzilla.suse.com/988552", }, { category: "self", summary: "SUSE CVE CVE-2014-9717 page", url: "https://www.suse.com/security/cve/CVE-2014-9717/", }, { category: "self", summary: "SUSE CVE CVE-2014-9904 page", url: "https://www.suse.com/security/cve/CVE-2014-9904/", }, { category: "self", summary: "SUSE CVE CVE-2015-7833 page", url: "https://www.suse.com/security/cve/CVE-2015-7833/", }, { category: "self", summary: "SUSE CVE CVE-2015-8539 page", url: "https://www.suse.com/security/cve/CVE-2015-8539/", }, { category: "self", summary: "SUSE CVE CVE-2015-8551 page", url: "https://www.suse.com/security/cve/CVE-2015-8551/", }, { category: "self", summary: "SUSE CVE CVE-2015-8552 page", url: "https://www.suse.com/security/cve/CVE-2015-8552/", }, { category: "self", summary: "SUSE CVE CVE-2015-8845 page", url: "https://www.suse.com/security/cve/CVE-2015-8845/", }, { category: "self", summary: "SUSE CVE CVE-2016-0758 page", url: "https://www.suse.com/security/cve/CVE-2016-0758/", }, { category: "self", summary: "SUSE CVE CVE-2016-1583 page", url: "https://www.suse.com/security/cve/CVE-2016-1583/", }, { category: "self", summary: "SUSE CVE CVE-2016-2053 page", url: "https://www.suse.com/security/cve/CVE-2016-2053/", }, { category: "self", summary: "SUSE CVE CVE-2016-2847 page", url: "https://www.suse.com/security/cve/CVE-2016-2847/", }, { category: "self", summary: "SUSE CVE CVE-2016-3672 page", url: "https://www.suse.com/security/cve/CVE-2016-3672/", }, { category: "self", summary: "SUSE CVE CVE-2016-3707 page", url: "https://www.suse.com/security/cve/CVE-2016-3707/", }, { category: "self", summary: "SUSE CVE CVE-2016-4470 page", url: "https://www.suse.com/security/cve/CVE-2016-4470/", }, { category: "self", summary: "SUSE CVE CVE-2016-4482 page", url: "https://www.suse.com/security/cve/CVE-2016-4482/", }, { category: "self", summary: "SUSE CVE CVE-2016-4486 page", url: "https://www.suse.com/security/cve/CVE-2016-4486/", }, { category: "self", summary: "SUSE CVE CVE-2016-4565 page", url: "https://www.suse.com/security/cve/CVE-2016-4565/", }, { category: "self", summary: "SUSE CVE CVE-2016-4569 page", url: "https://www.suse.com/security/cve/CVE-2016-4569/", }, { category: "self", summary: "SUSE CVE CVE-2016-4578 page", url: "https://www.suse.com/security/cve/CVE-2016-4578/", }, { category: "self", summary: "SUSE CVE CVE-2016-4805 page", url: "https://www.suse.com/security/cve/CVE-2016-4805/", }, { category: "self", summary: "SUSE CVE CVE-2016-4997 page", url: "https://www.suse.com/security/cve/CVE-2016-4997/", }, { category: "self", summary: "SUSE CVE CVE-2016-5244 page", url: "https://www.suse.com/security/cve/CVE-2016-5244/", }, { category: "self", summary: "SUSE CVE CVE-2016-5828 page", url: "https://www.suse.com/security/cve/CVE-2016-5828/", }, { category: "self", summary: "SUSE CVE CVE-2016-5829 page", url: "https://www.suse.com/security/cve/CVE-2016-5829/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2016-08-02T11:06:46Z", generator: { date: "2016-08-02T11:06:46Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:1937-1", initial_release_date: "2016-08-02T11:06:46Z", revision_history: [ { date: "2016-08-02T11:06:46Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-3.12.61-60.18.1.noarch", product: { name: "kernel-devel-rt-3.12.61-60.18.1.noarch", product_id: "kernel-devel-rt-3.12.61-60.18.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-3.12.61-60.18.1.noarch", product: { name: "kernel-source-rt-3.12.61-60.18.1.noarch", product_id: "kernel-source-rt-3.12.61-60.18.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-compute-3.12.61-60.18.1.x86_64", product: { name: "kernel-compute-3.12.61-60.18.1.x86_64", product_id: "kernel-compute-3.12.61-60.18.1.x86_64", }, }, { category: "product_version", name: "kernel-compute-base-3.12.61-60.18.1.x86_64", product: { name: "kernel-compute-base-3.12.61-60.18.1.x86_64", product_id: "kernel-compute-base-3.12.61-60.18.1.x86_64", }, }, { category: "product_version", name: "kernel-compute-devel-3.12.61-60.18.1.x86_64", product: { name: "kernel-compute-devel-3.12.61-60.18.1.x86_64", product_id: "kernel-compute-devel-3.12.61-60.18.1.x86_64", }, }, { category: "product_version", name: "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", product: { name: "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", product_id: "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-3.12.61-60.18.1.x86_64", product: { name: "kernel-rt-3.12.61-60.18.1.x86_64", product_id: "kernel-rt-3.12.61-60.18.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-3.12.61-60.18.1.x86_64", product: { name: "kernel-rt-base-3.12.61-60.18.1.x86_64", product_id: "kernel-rt-base-3.12.61-60.18.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-3.12.61-60.18.1.x86_64", product: { name: "kernel-rt-devel-3.12.61-60.18.1.x86_64", product_id: "kernel-rt-devel-3.12.61-60.18.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", product: { name: "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", product_id: "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-3.12.61-60.18.1.x86_64", product: { name: "kernel-syms-rt-3.12.61-60.18.1.x86_64", product_id: "kernel-syms-rt-3.12.61-60.18.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 12 SP1", product: { name: "SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1", }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-compute-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", }, product_reference: "kernel-compute-3.12.61-60.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-compute-base-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", }, product_reference: "kernel-compute-base-3.12.61-60.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-compute-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", }, product_reference: "kernel-compute-devel-3.12.61-60.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", }, product_reference: "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-3.12.61-60.18.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", }, product_reference: "kernel-devel-rt-3.12.61-60.18.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", }, product_reference: "kernel-rt-3.12.61-60.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", }, product_reference: "kernel-rt-base-3.12.61-60.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", }, product_reference: "kernel-rt-devel-3.12.61-60.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", }, product_reference: "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-3.12.61-60.18.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", }, product_reference: "kernel-source-rt-3.12.61-60.18.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", }, product_reference: "kernel-syms-rt-3.12.61-60.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2014-9717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9717", }, ], notes: [ { category: "general", text: "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9717", url: "https://www.suse.com/security/cve/CVE-2014-9717", }, { category: "external", summary: "SUSE Bug 928547 for CVE-2014-9717", url: "https://bugzilla.suse.com/928547", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "low", }, ], title: "CVE-2014-9717", }, { cve: "CVE-2014-9904", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9904", }, ], notes: [ { category: "general", text: "The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9904", url: "https://www.suse.com/security/cve/CVE-2014-9904", }, { category: "external", summary: "SUSE Bug 986811 for CVE-2014-9904", url: "https://bugzilla.suse.com/986811", }, { category: "external", summary: "SUSE Bug 986941 for CVE-2014-9904", url: "https://bugzilla.suse.com/986941", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2014-9904", }, { cve: "CVE-2015-7833", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-7833", }, ], notes: [ { category: "general", text: "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-7833", url: "https://www.suse.com/security/cve/CVE-2015-7833", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2015-7833", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 950998 for CVE-2015-7833", url: "https://bugzilla.suse.com/950998", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2015-7833", }, { cve: "CVE-2015-8539", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8539", }, ], notes: [ { category: "general", text: "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8539", url: "https://www.suse.com/security/cve/CVE-2015-8539", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2015-8539", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 781018 for CVE-2015-8539", url: "https://bugzilla.suse.com/781018", }, { category: "external", summary: "SUSE Bug 958463 for CVE-2015-8539", url: "https://bugzilla.suse.com/958463", }, { category: "external", summary: "SUSE Bug 958601 for CVE-2015-8539", url: "https://bugzilla.suse.com/958601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "important", }, ], title: "CVE-2015-8539", }, { cve: "CVE-2015-8551", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8551", }, ], notes: [ { category: "general", text: "The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka \"Linux pciback missing sanity checks.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8551", url: "https://www.suse.com/security/cve/CVE-2015-8551", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2015-8551", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 957990 for CVE-2015-8551", url: "https://bugzilla.suse.com/957990", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2015-8551", }, { cve: "CVE-2015-8552", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8552", }, ], notes: [ { category: "general", text: "The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka \"Linux pciback missing sanity checks.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8552", url: "https://www.suse.com/security/cve/CVE-2015-8552", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2015-8552", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 957990 for CVE-2015-8552", url: "https://bugzilla.suse.com/957990", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2015-8552", }, { cve: "CVE-2015-8845", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8845", }, ], notes: [ { category: "general", text: "The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8845", url: "https://www.suse.com/security/cve/CVE-2015-8845", }, { category: "external", summary: "SUSE Bug 975531 for CVE-2015-8845", url: "https://bugzilla.suse.com/975531", }, { category: "external", summary: "SUSE Bug 975533 for CVE-2015-8845", url: "https://bugzilla.suse.com/975533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2015-8845", }, { cve: "CVE-2016-0758", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0758", }, ], notes: [ { category: "general", text: "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0758", url: "https://www.suse.com/security/cve/CVE-2016-0758", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-0758", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1072204 for CVE-2016-0758", url: "https://bugzilla.suse.com/1072204", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-0758", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 979867 for CVE-2016-0758", url: "https://bugzilla.suse.com/979867", }, { category: "external", summary: "SUSE Bug 980856 for CVE-2016-0758", url: "https://bugzilla.suse.com/980856", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "important", }, ], title: "CVE-2016-0758", }, { cve: "CVE-2016-1583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1583", }, ], notes: [ { category: "general", text: "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1583", url: "https://www.suse.com/security/cve/CVE-2016-1583", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-1583", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-1583", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 983143 for CVE-2016-1583", url: "https://bugzilla.suse.com/983143", }, { category: "external", summary: "SUSE Bug 983144 for CVE-2016-1583", url: "https://bugzilla.suse.com/983144", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "important", }, ], title: "CVE-2016-1583", }, { cve: "CVE-2016-2053", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2053", }, ], notes: [ { category: "general", text: "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2053", url: "https://www.suse.com/security/cve/CVE-2016-2053", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2053", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 963762 for CVE-2016-2053", url: "https://bugzilla.suse.com/963762", }, { category: "external", summary: "SUSE Bug 979074 for CVE-2016-2053", url: "https://bugzilla.suse.com/979074", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2016-2053", }, { cve: "CVE-2016-2847", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2847", }, ], notes: [ { category: "general", text: "fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2847", url: "https://www.suse.com/security/cve/CVE-2016-2847", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2847", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970948 for CVE-2016-2847", url: "https://bugzilla.suse.com/970948", }, { category: "external", summary: "SUSE Bug 974646 for CVE-2016-2847", url: "https://bugzilla.suse.com/974646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2016-2847", }, { cve: "CVE-2016-3672", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3672", }, ], notes: [ { category: "general", text: "The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3672", url: "https://www.suse.com/security/cve/CVE-2016-3672", }, { category: "external", summary: "SUSE Bug 974308 for CVE-2016-3672", url: "https://bugzilla.suse.com/974308", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "low", }, ], title: "CVE-2016-3672", }, { cve: "CVE-2016-3707", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3707", }, ], notes: [ { category: "general", text: "The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3707", url: "https://www.suse.com/security/cve/CVE-2016-3707", }, { category: "external", summary: "SUSE Bug 980246 for CVE-2016-3707", url: "https://bugzilla.suse.com/980246", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "important", }, ], title: "CVE-2016-3707", }, { cve: "CVE-2016-4470", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4470", }, ], notes: [ { category: "general", text: "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4470", url: "https://www.suse.com/security/cve/CVE-2016-4470", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4470", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 984755 for CVE-2016-4470", url: "https://bugzilla.suse.com/984755", }, { category: "external", summary: "SUSE Bug 984764 for CVE-2016-4470", url: "https://bugzilla.suse.com/984764", }, { category: "external", summary: "SUSE Bug 991651 for CVE-2016-4470", url: "https://bugzilla.suse.com/991651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2016-4470", }, { cve: "CVE-2016-4482", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4482", }, ], notes: [ { category: "general", text: "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4482", url: "https://www.suse.com/security/cve/CVE-2016-4482", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4482", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 978401 for CVE-2016-4482", url: "https://bugzilla.suse.com/978401", }, { category: "external", summary: "SUSE Bug 978445 for CVE-2016-4482", url: "https://bugzilla.suse.com/978445", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "low", }, ], title: "CVE-2016-4482", }, { cve: "CVE-2016-4486", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4486", }, ], notes: [ { category: "general", text: "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4486", url: "https://www.suse.com/security/cve/CVE-2016-4486", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4486", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 978822 for CVE-2016-4486", url: "https://bugzilla.suse.com/978822", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "low", }, ], title: "CVE-2016-4486", }, { cve: "CVE-2016-4565", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4565", }, ], notes: [ { category: "general", text: "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4565", url: "https://www.suse.com/security/cve/CVE-2016-4565", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4565", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 979548 for CVE-2016-4565", url: "https://bugzilla.suse.com/979548", }, { category: "external", summary: "SUSE Bug 980363 for CVE-2016-4565", url: "https://bugzilla.suse.com/980363", }, { category: "external", summary: "SUSE Bug 980883 for CVE-2016-4565", url: "https://bugzilla.suse.com/980883", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2016-4565", }, { cve: "CVE-2016-4569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4569", }, ], notes: [ { category: "general", text: "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4569", url: "https://www.suse.com/security/cve/CVE-2016-4569", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4569", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 979213 for CVE-2016-4569", url: "https://bugzilla.suse.com/979213", }, { category: "external", summary: "SUSE Bug 979879 for CVE-2016-4569", url: "https://bugzilla.suse.com/979879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "low", }, ], title: "CVE-2016-4569", }, { cve: "CVE-2016-4578", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4578", }, ], notes: [ { category: "general", text: "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4578", url: "https://www.suse.com/security/cve/CVE-2016-4578", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4578", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-4578", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 979879 for CVE-2016-4578", url: "https://bugzilla.suse.com/979879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "low", }, ], title: "CVE-2016-4578", }, { cve: "CVE-2016-4805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4805", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4805", url: "https://www.suse.com/security/cve/CVE-2016-4805", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4805", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-4805", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 980371 for CVE-2016-4805", url: "https://bugzilla.suse.com/980371", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "low", }, ], title: "CVE-2016-4805", }, { cve: "CVE-2016-4997", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4997", }, ], notes: [ { category: "general", text: "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4997", url: "https://www.suse.com/security/cve/CVE-2016-4997", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4997", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 986362 for CVE-2016-4997", url: "https://bugzilla.suse.com/986362", }, { category: "external", summary: "SUSE Bug 986365 for CVE-2016-4997", url: "https://bugzilla.suse.com/986365", }, { category: "external", summary: "SUSE Bug 986377 for CVE-2016-4997", url: "https://bugzilla.suse.com/986377", }, { category: "external", summary: "SUSE Bug 991651 for CVE-2016-4997", url: "https://bugzilla.suse.com/991651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "important", }, ], title: "CVE-2016-4997", }, { cve: "CVE-2016-5244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5244", }, ], notes: [ { category: "general", text: "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5244", url: "https://www.suse.com/security/cve/CVE-2016-5244", }, { category: "external", summary: "SUSE Bug 983213 for CVE-2016-5244", url: "https://bugzilla.suse.com/983213", }, { category: "external", summary: "SUSE Bug 986225 for CVE-2016-5244", url: "https://bugzilla.suse.com/986225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2016-5244", }, { cve: "CVE-2016-5828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5828", }, ], notes: [ { category: "general", text: "The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5828", url: "https://www.suse.com/security/cve/CVE-2016-5828", }, { category: "external", summary: "SUSE Bug 986569 for CVE-2016-5828", url: "https://bugzilla.suse.com/986569", }, { category: "external", summary: "SUSE Bug 991065 for CVE-2016-5828", url: "https://bugzilla.suse.com/991065", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2016-5828", }, { cve: "CVE-2016-5829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5829", }, ], notes: [ { category: "general", text: "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5829", url: "https://www.suse.com/security/cve/CVE-2016-5829", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2016-5829", url: "https://bugzilla.suse.com/1053919", }, { category: "external", summary: "SUSE Bug 1054127 for CVE-2016-5829", url: "https://bugzilla.suse.com/1054127", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-5829", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 986572 for CVE-2016-5829", url: "https://bugzilla.suse.com/986572", }, { category: "external", summary: "SUSE Bug 986573 for CVE-2016-5829", url: "https://bugzilla.suse.com/986573", }, { category: "external", summary: "SUSE Bug 991651 for CVE-2016-5829", url: "https://bugzilla.suse.com/991651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-08-02T11:06:46Z", details: "moderate", }, ], title: "CVE-2016-5829", }, ], }
suse-su-2016:1696-1
Vulnerability from csaf_suse
Published
2016-06-28 11:02
Modified
2016-06-28 11:02
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.59 to receive various security and bugfixes.
Main feature additions:
- Improved support for Clustered File System (CephFS, fate#318586).
- Addition of kGraft patches now produces logging messages to simplify auditing (fate#317827).
The following security bugs were fixed:
- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).
- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bsc#970948).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126 971793).
- CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911 970970).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628).
- CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418).
- CVE-2016-4482: Fixed information leak in devio (bnc#978401).
- CVE-2016-4486: Fixed information leak in rtnetlink ( bsc#978822).
- CVE-2016-4569: Fixed information leak in events via snd_timer_user_tinterrupt (bsc#979213).
The following non-security bugs were fixed:
- ALSA: timer: Call notifier in the same spinlock (bsc#973378).
- ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378).
- ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378).
- ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).
- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).
- Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).
- Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).
- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).
- Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844).
- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).
- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951).
- Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#972951).
- Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371).
- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).
- CacheFiles: Handle object being killed before being set up (bsc#971049).
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- Drivers: hv: util: Pass the channel information during the init call (bnc#978527).
- Drivers: hv: utils: Invoke the poll function after handshake (bnc#978527).
- Drivers: hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().
- Export helper function to set irq affinity in pci-hyperv.
- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).
- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).
- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).
- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).
- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).
- FS-Cache: Out of line fscache_operation_init() (bsc#971049).
- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).
- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).
- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).
- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).
- FS-Cache: Timeout for releasepage() (bsc#971049).
- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).
- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- Fix kabi issue (bsc#971049).
- Input: i8042 - lower log level for 'no controller' message (bsc#945345).
- NFSv4.1: do not use machine credentials for CLOSE when using 'sec=sys' (bsc#972003).
- NVMe: Unify controller probe and resume (bsc#979347).
- NVMe: init nvme queue before enabling irq (bsc#662458).
- PCI/AER: Fix aer_inject error codes (bsc#931448).
- PCI/AER: Log actual error causes in aer_inject (bsc#931448).
- PCI/AER: Log aer_inject error injections (bsc#931448).
- PCI/AER: Use dev_warn() in aer_inject (bsc#931448).
- RDMA/ocrdma: Avoid reporting wrong completions in case of error CQEs (bsc#908151).
- Revert 'scsi: fix soft lockup in scsi_remove_target() on module removal' (bsc#970609).
- SUNRPC: Fix large reads on NFS/RDMA (bsc#908151).
- SUNRPC: remove KERN_INFO from dprintk() call sites (bsc#908151).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- Use mainline variant of hyperv KVP IP failover patch (bnc#978527)
- acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- acpi: Disable APEI error injection if securelevel is set (bsc#972891).
- apparmor: Skip proc ns files (bsc#959514).
- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).
- ceph fscache: Introduce a routine for uncaching single no data page from fscache ().
- ceph fscache: Uncaching no data page from fscache in readpage().
- ceph: Add fs/ceph as a supported module.
- ceph: Asynchronous IO support.
- ceph: Avoid to propagate the invalid page point.
- ceph: Clean up if error occurred in finish_read().
- ceph: EIO all operations after forced umount.
- ceph: Implement writev/pwritev for sync operation.
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: add acl for cephfs.
- ceph: add acl, noacl options for cephfs mount.
- ceph: add get_name() NFS export callback.
- ceph: add get_parent() NFS export callback.
- ceph: add imported caps when handling cap export message.
- ceph: add inline data to pagecache.
- ceph: add missing init_acl() for mkdir() and atomic_open().
- ceph: add open export target session helper.
- ceph: add request to i_unsafe_dirops when getting unsafe reply.
- ceph: additional debugfs output.
- ceph: always re-send cap flushes when MDS recovers.
- ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync).
- ceph: avoid releasing caps that are being used.
- ceph: avoid sending unnessesary FLUSHSNAP message.
- ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename().
- ceph: cast PAGE_SIZE to size_t in ceph_sync_write().
- ceph: ceph_frag_contains_value can be boolean.
- ceph: ceph_get_parent() can be static.
- ceph: check OSD caps before read/write.
- ceph: check buffer size in ceph_vxattrcb_layout().
- ceph: check caps in filemap_fault and page_mkwrite.
- ceph: check directory's completeness before emitting directory entry.
- ceph: check inode caps in ceph_d_revalidate.
- ceph: check unsupported fallocate mode.
- ceph: check zero length in ceph_sync_read().
- ceph: checking for IS_ERR instead of NULL.
- ceph: cleanup unsafe requests when reconnecting is denied.
- ceph: cleanup use of ceph_msg_get.
- ceph: clear directory's completeness when creating file.
- ceph: convert inline data to normal data before data write.
- ceph: do not assume r_old_dentry[_dir] always set together.
- ceph: do not chain inode updates to parent fsync.
- ceph: do not grabs open file reference for aborted request.
- ceph: do not include ceph.{file,dir}.layout vxattr in listxattr().
- ceph: do not include used caps in cap_wanted.
- ceph: do not invalidate page cache when inode is no longer used.
- ceph: do not mark dirty caps when there is no auth cap.
- ceph: do not pre-allocate space for cap release messages.
- ceph: do not set r_old_dentry_dir on link().
- ceph: do not trim auth cap when there are cap snaps.
- ceph: do not zero i_wrbuffer_ref when reconnecting is denied.
- ceph: drop cap releases in requests composed before cap reconnect.
- ceph: drop extra open file reference in ceph_atomic_open().
- ceph: drop unconnected inodes.
- ceph: exclude setfilelock requests when calculating oldest tid.
- ceph: export ceph_session_state_name function.
- ceph: fetch inline data when getting Fcr cap refs.
- ceph: fix __dcache_readdir().
- ceph: fix a comment typo.
- ceph: fix append mode write.
- ceph: fix atomic_open snapdir.
- ceph: fix bool assignments.
- ceph: fix cache revoke race.
- ceph: fix ceph_dir_llseek().
- ceph: fix ceph_fh_to_parent().
- ceph: fix ceph_removexattr().
- ceph: fix ceph_set_acl().
- ceph: fix ceph_writepages_start().
- ceph: fix dcache/nocache mount option.
- ceph: fix dentry leaks.
- ceph: fix directory fsync.
- ceph: fix divide-by-zero in __validate_layout().
- ceph: fix double page_unlock() in page_mkwrite().
- ceph: fix dout() compile warnings in ceph_filemap_fault().
- ceph: fix file lock interruption.
- ceph: fix flush tid comparision.
- ceph: fix flushing caps.
- ceph: fix llistxattr on symlink.
- ceph: fix message length computation.
- ceph: fix mksnap crash.
- ceph: fix null pointer dereference in send_mds_reconnect().
- ceph: fix pr_fmt() redefinition.
- ceph: fix queuing inode to mdsdir's snaprealm.
- ceph: fix reading inline data when i_size > PAGE_SIZE.
- ceph: fix request time stamp encoding.
- ceph: fix reset_readdir().
- ceph: fix setting empty extended attribute.
- ceph: fix sizeof(struct tYpO *) typo.
- ceph: fix snap context leak in error path.
- ceph: fix trim caps.
- ceph: fix uninline data function.
- ceph: flush cap release queue when trimming session caps.
- ceph: flush inline version.
- ceph: forbid mandatory file lock.
- ceph: fscache: Update object store limit after file writing.
- ceph: fscache: Wait for completion of object initialization.
- ceph: fscache: add an interface to synchronize object store limit.
- ceph: get inode size for each append write.
- ceph: handle -ESTALE reply.
- ceph: handle SESSION_FORCE_RO message.
- ceph: handle cap export race in try_flush_caps().
- ceph: handle cap import atomically.
- ceph: handle frag mismatch between readdir request and reply.
- ceph: handle race between cap reconnect and cap release.
- ceph: handle session flush message.
- ceph: hold on to exclusive caps on complete directories.
- ceph: implement readv/preadv for sync operation.
- ceph: improve readahead for file holes.
- ceph: improve reference tracking for snaprealm.
- ceph: include time stamp in every MDS request.
- ceph: include time stamp in replayed MDS requests.
- ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support.
- ceph: initialize inode before instantiating dentry.
- ceph: introduce a new inode flag indicating if cached dentries are ordered.
- ceph: introduce ceph_fill_fragtree().
- ceph: introduce global empty snap context.
- ceph: invalidate dirty pages after forced umount.
- ceph: keep i_snap_realm while there are writers.
- ceph: kstrdup() memory handling.
- ceph: let MDS adjust readdir 'frag'.
- ceph: make ceph_forget_all_cached_acls() static inline.
- ceph: make fsync() wait unsafe requests that created/modified inode.
- ceph: make sure syncfs flushes all cap snaps.
- ceph: make sure write caps are registered with auth MDS.
- ceph: match wait_for_completion_timeout return type.
- ceph: message versioning fixes.
- ceph: move ceph_find_inode() outside the s_mutex.
- ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks.
- ceph: no need to get parent inode in ceph_open.
- ceph: parse inline data in MClientReply and MClientCaps.
- ceph: pre-allocate ceph_cap struct for ceph_add_cap().
- ceph: pre-allocate data structure that tracks caps flushing.
- ceph: preallocate buffer for readdir reply.
- ceph: print inode number for LOOKUPINO request.
- ceph: properly apply umask when ACL is enabled.
- ceph: properly handle XATTR_CREATE and XATTR_REPLACE.
- ceph: properly mark empty directory as complete.
- ceph: properly release page upon error.
- ceph: properly zero data pages for file holes.
- ceph: provide seperate {inode,file}_operations for snapdir.
- ceph: queue cap release in __ceph_remove_cap().
- ceph: queue vmtruncate if necessary when handing cap grant/revoke.
- ceph: ratelimit warn messages for MDS closes session.
- ceph: re-send AIO write request when getting -EOLDSNAP error.
- ceph: re-send flushing caps (which are revoked) in reconnect stage.
- ceph: re-send requests when MDS enters reconnecting stage.
- ceph: refactor readpage_nounlock() to make the logic clearer.
- ceph: remember subtree root dirfrag's auth MDS.
- ceph: remove exported caps when handling cap import message.
- ceph: remove outdated frag information.
- ceph: remove redundant code for max file size verification.
- ceph: remove redundant declaration.
- ceph: remove redundant memset(0).
- ceph: remove redundant test of head->safe and silence static analysis warnings.
- ceph: remove the useless judgement.
- ceph: remove unused functions in ceph_frag.h.
- ceph: remove unused stringification macros.
- ceph: remove useless ACL check.
- ceph: remove xattr when null value is given to setxattr().
- ceph: rename snapshot support.
- ceph: replace comma with a semicolon.
- ceph: request xattrs if xattr_version is zero.
- ceph: reserve caps for file layout/lock MDS requests.
- ceph: reset r_resend_mds after receiving -ESTALE.
- ceph: return error for traceless reply race.
- ceph: rework dcache readdir.
- ceph: send TID of the oldest pending caps flush to MDS.
- ceph: send client metadata to MDS.
- ceph: set caps count after composing cap reconnect message.
- ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference.
- ceph: set mds_wanted when MDS reply changes a cap to auth cap.
- ceph: show nocephx_require_signatures and notcp_nodelay options.
- ceph: show non-default options only.
- ceph: simplify ceph_fh_to_dentry().
- ceph: simplify two mount_timeout sites.
- ceph: skip invalid dentry during dcache readdir.
- ceph: support inline data feature.
- ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL.
- ceph: sync read inline data.
- ceph: take snap_rwsem when accessing snap realm's cached_context.
- ceph: track pending caps flushing accurately.
- ceph: track pending caps flushing globally.
- ceph: trim unused inodes before reconnecting to recovering MDS.
- ceph: trivial comment fix.
- ceph: update i_max_size even if inode version does not change.
- ceph: update inode fields according to issued caps.
- ceph: use %zu for len in ceph_fill_inline_data().
- ceph: use ceph_seq_cmp() to compare migrate_seq.
- ceph: use empty snap context for uninline_data and get_pool_perm.
- ceph: use fl->fl_file as owner identifier of flock and posix lock.
- ceph: use fl->fl_type to decide flock operation.
- ceph: use fpos_cmp() to compare dentry positions.
- ceph: use getattr request to fetch inline data.
- ceph: use i_size_{read,write} to get/set i_size.
- ceph: use msecs_to_jiffies for time conversion.
- ceph: use pagelist to present MDS request data.
- ceph: use truncate_pagecache() instead of truncate_inode_pages().
- ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure.
- client: include kernel version in client metadata.
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- crush: add chooseleaf_stable tunable.
- crush: decode and initialize chooseleaf_stable.
- crush: ensure bucket id is valid before indexing buckets array.
- crush: ensure take bucket value is valid.
- crush: fix crash from invalid 'take' argument.
- crush: sync up with userspace.
- crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).
- crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).
- dasd: fix hanging system after LCU changes (bnc#968497, LTC#136671).
- drm/core: Preserve the framebuffer after removing it (bsc#968812).
- drm/i915: do not warn if backlight unexpectedly enabled (boo#972068).
- drm/i915: set backlight duty cycle after backlight enable for gen4 (boo#972780).
- drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813).
- drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813).
- ext4: Fix softlockups in SEEK_HOLE and SEEK_DATA implementations (bsc#942262).
- ext4: fix races between page faults and hole punching (bsc#972174).
- ext4: fix races of writeback with punch hole and zero range (bsc#972174).
- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).
- fs, seqfile: always allow oom killer (bnc#968687).
- fs/ceph/debugfs.c: replace seq_printf by seq_puts.
- fs/ceph: replace pr_warning by pr_warn.
- fs/pipe.c: skip file_update_time on frozen fs (bsc#975488).
- ibmvscsi: Remove unsupported host config MAD (bsc#973556).
- iommu/vt-d: Improve fault handler error messages (bsc#975772).
- iommu/vt-d: Ratelimit fault handler (bsc#975772).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().
- kABI: protect function file_open_root.
- kABI: protect include in evm.
- kABI: protect struct user_struct.
- kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573).
- kabi/severities: Allow changes in zpci_* symbols (bsc#974692)
- kabi/severities: Whitelist libceph and rbd (bsc#964727).
- kabi: kgr, add reserved fields.
- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- kgr: add TAINT_KGRAFT.
- kgr: add kgraft annotation to hwrng kthread.
- kgr: add kgraft annotations to kthreads' wait_event_freezable() API calls.
- kgr: add objname to kgr_patch_fun struct.
- kgr: add sympos and objname to error and debug messages.
- kgr: add sympos as disambiguator field to kgr_patch_fun structure.
- kgr: add sympos to sysfs.
- kgr: call kgr_init_ftrace_ops() only for loaded objects.
- kgr: change to kallsyms_on_each_symbol iterator.
- kgr: define pr_fmt and modify all pr_* messages.
- kgr: do not print error for !abort_if_missing symbols (bnc#943989).
- kgr: do not return and print an error only if the object is not loaded.
- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).
- kgr: fix an asymmetric dealing with delayed module loading.
- kgr: fix redirection on s390x arch (bsc#903279).
- kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().
- kgr: handle btrfs kthreads (bnc#889207).
- kgr: kmemleak, really mark the kthread safe after an interrupt.
- kgr: kmemleak, really mark the kthread safe after an interrupt.
- kgr: log when modifying kernel.
- kgr: mark kernel unsupported upon patch revert.
- kgr: mark some more missed kthreads (bnc#962336).
- kgr: remove abort_if_missing flag.
- kgr: usb/storage: do not emit thread awakened (bnc#899908).
- kgraft/gfs2: Do not block livepatching in the log daemon for too long.
- kgraft/xen: Do not block livepatching in the XEN blkif kthread.
- libceph: Avoid holding the zero page on ceph_msgr_slab_init errors.
- libceph: Fix ceph_tcp_sendpage()'s more boolean usage.
- libceph: MOSDOpReply v7 encoding.
- libceph: Remove spurious kunmap() of the zero page.
- libceph: a couple tweaks for wait loops.
- libceph: add nocephx_sign_messages option.
- libceph: advertise support for TUNABLES5.
- libceph: advertise support for keepalive2.
- libceph: allow setting osd_req_op's flags.
- libceph: check data_len in ->alloc_msg().
- libceph: clear messenger auth_retry flag if we fault.
- libceph: clear msg->con in ceph_msg_release() only.
- libceph: do not access invalid memory in keepalive2 path.
- libceph: do not spam dmesg with stray reply warnings.
- libceph: drop authorizer check from cephx msg signing routines.
- libceph: evaluate osd_req_op_data() arguments only once.
- libceph: fix authorizer invalidation, take 2.
- libceph: fix ceph_msg_revoke().
- libceph: fix wrong name 'Ceph filesystem for Linux'.
- libceph: introduce ceph_x_authorizer_cleanup().
- libceph: invalidate AUTH in addition to a service ticket.
- libceph: kill off ceph_x_ticket_handler::validity.
- libceph: move ceph_file_layout helpers to ceph_fs.h.
- libceph: msg signing callouts do not need con argument.
- libceph: nuke time_sub().
- libceph: properly release STAT request's raw_data_in.
- libceph: remove con argument in handle_reply().
- libceph: remove outdated comment.
- libceph: remove the unused macro AES_KEY_SIZE.
- libceph: rename con_work() to ceph_con_workfn().
- libceph: set 'exists' flag for newly up osd.
- libceph: stop duplicating client fields in messenger.
- libceph: store timeouts in jiffies, verify user input.
- libceph: treat sockaddr_storage with uninitialized family as blank.
- libceph: use keepalive2 to verify the mon session is alive.
- libceph: use list_for_each_entry_safe.
- libceph: use list_next_entry instead of list_entry_next.
- libceph: use local variable cursor instead of &msg->cursor.
- libceph: use the right footer size when skipping a message.
- libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).
- mds: check cap ID when handling cap export message.
- mmc: Allow forward compatibility for eMMC (bnc#966054).
- mmc: sdhci: Allow for irq being shared (bnc#977582).
- mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).
- nfs-rdma: Fix for FMR leaks (bsc#908151).
- nfs: fix high load average due to callback thread sleeping (bsc#971170).
- nvme: fix max_segments integer truncation (bsc#676471).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- pipe: limit the per-user amount of pages allocated in pipes (bsc#970948).
- powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).
- powerpc/book3s64: Remove __end_handlers marker (bsc#976821).
- rbd: bump queue_max_segments.
- rbd: delete an unnecessary check before rbd_dev_destroy().
- rbd: do not free rbd_dev outside of the release callback.
- rbd: do not put snap_context twice in rbd_queue_workfn().
- rbd: drop null test before destroy functions.
- rbd: plug rbd_dev->header.object_prefix memory leak.
- rbd: rbd_wq comment is obsolete.
- rbd: remove duplicate calls to rbd_dev_mapping_clear().
- rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails.
- rbd: set device_type::release instead of device::release.
- rbd: set max_sectors explicitly.
- rbd: store rbd_options in rbd_device.
- rbd: terminate rbd_opts_tokens with Opt_err.
- rbd: timeout watch teardown on unmap with mount_timeout.
- rbd: use GFP_NOIO consistently for request allocations (bsc#971159).
- rbd: use writefull op for object size writes.
- reduce m_start() cost.. (bsc#966573).
- s390/compat: correct restore of high gprs on signal return (bnc#968497, LTC#137571).
- s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413).
- s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).
- s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).
- s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).
- s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#974692, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).
- s390/zcrypt: HWRNG registration cause kernel panic on CEX hotplug (bnc#968497, LTC#138409).
- scsi-bnx2fc-handle_scsi_retry_delay
- scsi-bnx2fc-soft_lockup_when_rmmod
- scsi: Add intermediate STARGET_REMOVE state to scsi_target_state (bsc#970609).
- scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).
- sd: get disk reference in sd_check_events() (bnc#897662).
- supported.conf: Add bridge.ko for OpenStack (bsc#971600)
- supported.conf: add pci-hyperv
- supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461)
- svcrdma: Fence LOCAL_INV work requests (bsc#908151).
- svcrdma: advertise the correct max payload (bsc#908151).
- svcrdma: fix offset calculation for non-page aligned sge entries (bsc#908151).
- svcrdma: fix printk when memory allocation fails (bsc#908151).
- svcrdma: refactor marshalling logic (bsc#908151).
- svcrdma: send_write() must not overflow the device's max sge (bsc#908151).
- target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872).
- target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872).
- target: Fix LUN_RESET active TMR descriptor handling (bsc#962872).
- target: Fix TAS handling for multi-session se_node_acls (bsc#962872).
- target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872).
- target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872).
- tcp: convert cached rtt from usec to jiffies when feeding initial rto (bsc#937086).
- vgaarb: Add more context to error messages (bsc#976868).
- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- xprtrdma: Allocate missing pagelist (bsc#908151).
- xprtrdma: Avoid deadlock when credit window is reset (bsc#908151).
- xprtrdma: Disconnect on registration failure (bsc#908151).
- xprtrdma: Ensure ia->ri_id->qp is not NULL when reconnecting (bsc#908151).
- xprtrdma: Fall back to MTHCAFMR when FRMR is not supported (bsc#908151).
- xprtrdma: Limit work done by completion handler (bsc#908151).
- xprtrdma: Make rpcrdma_ep_destroy() return void (bsc#908151).
- xprtrdma: RPC/RDMA must invoke xprt_wake_pending_tasks() in process context (bsc#908151).
- xprtrdma: Reduce the number of hardway buffer allocations (bsc#908151).
- xprtrdma: Remove BOUNCEBUFFERS memory registration mode (bsc#908151).
- xprtrdma: Remove BUG_ON() call sites (bsc#908151).
- xprtrdma: Remove MEMWINDOWS registration modes (bsc#908151).
- xprtrdma: Remove REGISTER memory registration mode (bsc#908151).
- xprtrdma: Remove Tavor MTU setting (bsc#908151).
- xprtrdma: Reset connection timeout after successful reconnect (bsc#908151).
- xprtrdma: Simplify rpcrdma_deregister_external() synopsis (bsc#908151).
- xprtrdma: Split the completion queue (bsc#908151).
- xprtrdma: Use macros for reconnection timeout constants (bsc#908151).
- xprtrdma: mind the device's max fast register page list depth (bsc#908151).
- xprtrdma: mount reports 'Invalid mount option' if memreg mode not supported (bsc#908151).
- xprtrmda: Reduce calls to ib_poll_cq() in completion handlers (bsc#908151).
- xprtrmda: Reduce lock contention in completion handlers (bsc#908151).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1004,SUSE-SLE-Live-Patching-12-2016-1004,SUSE-SLE-Module-Public-Cloud-12-2016-1004,SUSE-SLE-SDK-12-SP1-2016-1004,SUSE-SLE-SERVER-12-SP1-2016-1004,SUSE-SLE-WE-12-SP1-2016-1004
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.59 to receive various security and bugfixes.\n\nMain feature additions:\n- Improved support for Clustered File System (CephFS, fate#318586).\n- Addition of kGraft patches now produces logging messages to simplify auditing (fate#317827).\n\nThe following security bugs were fixed:\n- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).\n- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).\n- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).\n- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).\n- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).\n- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bsc#970948).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126 971793).\n- CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955).\n- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).\n- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911 970970).\n- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).\n- CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628).\n- CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418).\n- CVE-2016-4482: Fixed information leak in devio (bnc#978401).\n- CVE-2016-4486: Fixed information leak in rtnetlink ( bsc#978822).\n- CVE-2016-4569: Fixed information leak in events via snd_timer_user_tinterrupt (bsc#979213).\n\nThe following non-security bugs were fixed:\n- ALSA: timer: Call notifier in the same spinlock (bsc#973378).\n- ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378).\n- ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378).\n- ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).\n- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).\n- Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).\n- Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855).\n- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).\n- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).\n- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).\n- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).\n- Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844).\n- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).\n- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).\n- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951).\n- Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#972951).\n- Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371).\n- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).\n- CacheFiles: Handle object being killed before being set up (bsc#971049).\n- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).\n- Drivers: hv: util: Pass the channel information during the init call (bnc#978527).\n- Drivers: hv: utils: Invoke the poll function after handshake (bnc#978527).\n- Drivers: hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().\n- Export helper function to set irq affinity in pci-hyperv.\n- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).\n- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).\n- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).\n- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).\n- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).\n- FS-Cache: Out of line fscache_operation_init() (bsc#971049).\n- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).\n- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).\n- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).\n- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).\n- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).\n- FS-Cache: Timeout for releasepage() (bsc#971049).\n- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).\n- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).\n- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- Fix kabi issue (bsc#971049).\n- Input: i8042 - lower log level for 'no controller' message (bsc#945345).\n- NFSv4.1: do not use machine credentials for CLOSE when using 'sec=sys' (bsc#972003).\n- NVMe: Unify controller probe and resume (bsc#979347).\n- NVMe: init nvme queue before enabling irq (bsc#662458).\n- PCI/AER: Fix aer_inject error codes (bsc#931448).\n- PCI/AER: Log actual error causes in aer_inject (bsc#931448).\n- PCI/AER: Log aer_inject error injections (bsc#931448).\n- PCI/AER: Use dev_warn() in aer_inject (bsc#931448).\n- RDMA/ocrdma: Avoid reporting wrong completions in case of error CQEs (bsc#908151).\n- Revert 'scsi: fix soft lockup in scsi_remove_target() on module removal' (bsc#970609).\n- SUNRPC: Fix large reads on NFS/RDMA (bsc#908151).\n- SUNRPC: remove KERN_INFO from dprintk() call sites (bsc#908151).\n- USB: usbip: fix potential out-of-bounds write (bnc#975945).\n- Use mainline variant of hyperv KVP IP failover patch (bnc#978527)\n- acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).\n- acpi: Disable APEI error injection if securelevel is set (bsc#972891).\n- apparmor: Skip proc ns files (bsc#959514).\n- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).\n- ceph fscache: Introduce a routine for uncaching single no data page from fscache ().\n- ceph fscache: Uncaching no data page from fscache in readpage().\n- ceph: Add fs/ceph as a supported module.\n- ceph: Asynchronous IO support.\n- ceph: Avoid to propagate the invalid page point.\n- ceph: Clean up if error occurred in finish_read().\n- ceph: EIO all operations after forced umount.\n- ceph: Implement writev/pwritev for sync operation.\n- ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n- ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n- ceph: add acl for cephfs.\n- ceph: add acl, noacl options for cephfs mount.\n- ceph: add get_name() NFS export callback.\n- ceph: add get_parent() NFS export callback.\n- ceph: add imported caps when handling cap export message.\n- ceph: add inline data to pagecache.\n- ceph: add missing init_acl() for mkdir() and atomic_open().\n- ceph: add open export target session helper.\n- ceph: add request to i_unsafe_dirops when getting unsafe reply.\n- ceph: additional debugfs output.\n- ceph: always re-send cap flushes when MDS recovers.\n- ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps).\n- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions).\n- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync).\n- ceph: avoid releasing caps that are being used.\n- ceph: avoid sending unnessesary FLUSHSNAP message.\n- ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename().\n- ceph: cast PAGE_SIZE to size_t in ceph_sync_write().\n- ceph: ceph_frag_contains_value can be boolean.\n- ceph: ceph_get_parent() can be static.\n- ceph: check OSD caps before read/write.\n- ceph: check buffer size in ceph_vxattrcb_layout().\n- ceph: check caps in filemap_fault and page_mkwrite.\n- ceph: check directory's completeness before emitting directory entry.\n- ceph: check inode caps in ceph_d_revalidate.\n- ceph: check unsupported fallocate mode.\n- ceph: check zero length in ceph_sync_read().\n- ceph: checking for IS_ERR instead of NULL.\n- ceph: cleanup unsafe requests when reconnecting is denied.\n- ceph: cleanup use of ceph_msg_get.\n- ceph: clear directory's completeness when creating file.\n- ceph: convert inline data to normal data before data write.\n- ceph: do not assume r_old_dentry[_dir] always set together.\n- ceph: do not chain inode updates to parent fsync.\n- ceph: do not grabs open file reference for aborted request.\n- ceph: do not include ceph.{file,dir}.layout vxattr in listxattr().\n- ceph: do not include used caps in cap_wanted.\n- ceph: do not invalidate page cache when inode is no longer used.\n- ceph: do not mark dirty caps when there is no auth cap.\n- ceph: do not pre-allocate space for cap release messages.\n- ceph: do not set r_old_dentry_dir on link().\n- ceph: do not trim auth cap when there are cap snaps.\n- ceph: do not zero i_wrbuffer_ref when reconnecting is denied.\n- ceph: drop cap releases in requests composed before cap reconnect.\n- ceph: drop extra open file reference in ceph_atomic_open().\n- ceph: drop unconnected inodes.\n- ceph: exclude setfilelock requests when calculating oldest tid.\n- ceph: export ceph_session_state_name function.\n- ceph: fetch inline data when getting Fcr cap refs.\n- ceph: fix __dcache_readdir().\n- ceph: fix a comment typo.\n- ceph: fix append mode write.\n- ceph: fix atomic_open snapdir.\n- ceph: fix bool assignments.\n- ceph: fix cache revoke race.\n- ceph: fix ceph_dir_llseek().\n- ceph: fix ceph_fh_to_parent().\n- ceph: fix ceph_removexattr().\n- ceph: fix ceph_set_acl().\n- ceph: fix ceph_writepages_start().\n- ceph: fix dcache/nocache mount option.\n- ceph: fix dentry leaks.\n- ceph: fix directory fsync.\n- ceph: fix divide-by-zero in __validate_layout().\n- ceph: fix double page_unlock() in page_mkwrite().\n- ceph: fix dout() compile warnings in ceph_filemap_fault().\n- ceph: fix file lock interruption.\n- ceph: fix flush tid comparision.\n- ceph: fix flushing caps.\n- ceph: fix llistxattr on symlink.\n- ceph: fix message length computation.\n- ceph: fix mksnap crash.\n- ceph: fix null pointer dereference in send_mds_reconnect().\n- ceph: fix pr_fmt() redefinition.\n- ceph: fix queuing inode to mdsdir's snaprealm.\n- ceph: fix reading inline data when i_size > PAGE_SIZE.\n- ceph: fix request time stamp encoding.\n- ceph: fix reset_readdir().\n- ceph: fix setting empty extended attribute.\n- ceph: fix sizeof(struct tYpO *) typo.\n- ceph: fix snap context leak in error path.\n- ceph: fix trim caps.\n- ceph: fix uninline data function.\n- ceph: flush cap release queue when trimming session caps.\n- ceph: flush inline version.\n- ceph: forbid mandatory file lock.\n- ceph: fscache: Update object store limit after file writing.\n- ceph: fscache: Wait for completion of object initialization.\n- ceph: fscache: add an interface to synchronize object store limit.\n- ceph: get inode size for each append write.\n- ceph: handle -ESTALE reply.\n- ceph: handle SESSION_FORCE_RO message.\n- ceph: handle cap export race in try_flush_caps().\n- ceph: handle cap import atomically.\n- ceph: handle frag mismatch between readdir request and reply.\n- ceph: handle race between cap reconnect and cap release.\n- ceph: handle session flush message.\n- ceph: hold on to exclusive caps on complete directories.\n- ceph: implement readv/preadv for sync operation.\n- ceph: improve readahead for file holes.\n- ceph: improve reference tracking for snaprealm.\n- ceph: include time stamp in every MDS request.\n- ceph: include time stamp in replayed MDS requests.\n- ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support.\n- ceph: initialize inode before instantiating dentry.\n- ceph: introduce a new inode flag indicating if cached dentries are ordered.\n- ceph: introduce ceph_fill_fragtree().\n- ceph: introduce global empty snap context.\n- ceph: invalidate dirty pages after forced umount.\n- ceph: keep i_snap_realm while there are writers.\n- ceph: kstrdup() memory handling.\n- ceph: let MDS adjust readdir 'frag'.\n- ceph: make ceph_forget_all_cached_acls() static inline.\n- ceph: make fsync() wait unsafe requests that created/modified inode.\n- ceph: make sure syncfs flushes all cap snaps.\n- ceph: make sure write caps are registered with auth MDS.\n- ceph: match wait_for_completion_timeout return type.\n- ceph: message versioning fixes.\n- ceph: move ceph_find_inode() outside the s_mutex.\n- ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks.\n- ceph: no need to get parent inode in ceph_open.\n- ceph: parse inline data in MClientReply and MClientCaps.\n- ceph: pre-allocate ceph_cap struct for ceph_add_cap().\n- ceph: pre-allocate data structure that tracks caps flushing.\n- ceph: preallocate buffer for readdir reply.\n- ceph: print inode number for LOOKUPINO request.\n- ceph: properly apply umask when ACL is enabled.\n- ceph: properly handle XATTR_CREATE and XATTR_REPLACE.\n- ceph: properly mark empty directory as complete.\n- ceph: properly release page upon error.\n- ceph: properly zero data pages for file holes.\n- ceph: provide seperate {inode,file}_operations for snapdir.\n- ceph: queue cap release in __ceph_remove_cap().\n- ceph: queue vmtruncate if necessary when handing cap grant/revoke.\n- ceph: ratelimit warn messages for MDS closes session.\n- ceph: re-send AIO write request when getting -EOLDSNAP error.\n- ceph: re-send flushing caps (which are revoked) in reconnect stage.\n- ceph: re-send requests when MDS enters reconnecting stage.\n- ceph: refactor readpage_nounlock() to make the logic clearer.\n- ceph: remember subtree root dirfrag's auth MDS.\n- ceph: remove exported caps when handling cap import message.\n- ceph: remove outdated frag information.\n- ceph: remove redundant code for max file size verification.\n- ceph: remove redundant declaration.\n- ceph: remove redundant memset(0).\n- ceph: remove redundant test of head->safe and silence static analysis warnings.\n- ceph: remove the useless judgement.\n- ceph: remove unused functions in ceph_frag.h.\n- ceph: remove unused stringification macros.\n- ceph: remove useless ACL check.\n- ceph: remove xattr when null value is given to setxattr().\n- ceph: rename snapshot support.\n- ceph: replace comma with a semicolon.\n- ceph: request xattrs if xattr_version is zero.\n- ceph: reserve caps for file layout/lock MDS requests.\n- ceph: reset r_resend_mds after receiving -ESTALE.\n- ceph: return error for traceless reply race.\n- ceph: rework dcache readdir.\n- ceph: send TID of the oldest pending caps flush to MDS.\n- ceph: send client metadata to MDS.\n- ceph: set caps count after composing cap reconnect message.\n- ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference.\n- ceph: set mds_wanted when MDS reply changes a cap to auth cap.\n- ceph: show nocephx_require_signatures and notcp_nodelay options.\n- ceph: show non-default options only.\n- ceph: simplify ceph_fh_to_dentry().\n- ceph: simplify two mount_timeout sites.\n- ceph: skip invalid dentry during dcache readdir.\n- ceph: support inline data feature.\n- ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL.\n- ceph: sync read inline data.\n- ceph: take snap_rwsem when accessing snap realm's cached_context.\n- ceph: track pending caps flushing accurately.\n- ceph: track pending caps flushing globally.\n- ceph: trim unused inodes before reconnecting to recovering MDS.\n- ceph: trivial comment fix.\n- ceph: update i_max_size even if inode version does not change.\n- ceph: update inode fields according to issued caps.\n- ceph: use %zu for len in ceph_fill_inline_data().\n- ceph: use ceph_seq_cmp() to compare migrate_seq.\n- ceph: use empty snap context for uninline_data and get_pool_perm.\n- ceph: use fl->fl_file as owner identifier of flock and posix lock.\n- ceph: use fl->fl_type to decide flock operation.\n- ceph: use fpos_cmp() to compare dentry positions.\n- ceph: use getattr request to fetch inline data.\n- ceph: use i_size_{read,write} to get/set i_size.\n- ceph: use msecs_to_jiffies for time conversion.\n- ceph: use pagelist to present MDS request data.\n- ceph: use truncate_pagecache() instead of truncate_inode_pages().\n- ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure.\n- client: include kernel version in client metadata.\n- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).\n- crush: add chooseleaf_stable tunable.\n- crush: decode and initialize chooseleaf_stable.\n- crush: ensure bucket id is valid before indexing buckets array.\n- crush: ensure take bucket value is valid.\n- crush: fix crash from invalid 'take' argument.\n- crush: sync up with userspace.\n- crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).\n- crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).\n- dasd: fix hanging system after LCU changes (bnc#968497, LTC#136671).\n- drm/core: Preserve the framebuffer after removing it (bsc#968812).\n- drm/i915: do not warn if backlight unexpectedly enabled (boo#972068).\n- drm/i915: set backlight duty cycle after backlight enable for gen4 (boo#972780).\n- drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813).\n- drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813).\n- ext4: Fix softlockups in SEEK_HOLE and SEEK_DATA implementations (bsc#942262).\n- ext4: fix races between page faults and hole punching (bsc#972174).\n- ext4: fix races of writeback with punch hole and zero range (bsc#972174).\n- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).\n- fs, seqfile: always allow oom killer (bnc#968687).\n- fs/ceph/debugfs.c: replace seq_printf by seq_puts.\n- fs/ceph: replace pr_warning by pr_warn.\n- fs/pipe.c: skip file_update_time on frozen fs (bsc#975488).\n- ibmvscsi: Remove unsupported host config MAD (bsc#973556).\n- iommu/vt-d: Improve fault handler error messages (bsc#975772).\n- iommu/vt-d: Ratelimit fault handler (bsc#975772).\n- ipv6: make fib6 serial number per namespace (bsc#965319).\n- ipv6: per netns FIB garbage collection (bsc#965319).\n- ipv6: per netns fib6 walkers (bsc#965319).\n- ipv6: replace global gc_args with local variable (bsc#965319).\n- kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().\n- kABI: protect function file_open_root.\n- kABI: protect include in evm.\n- kABI: protect struct user_struct.\n- kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573).\n- kabi/severities: Allow changes in zpci_* symbols (bsc#974692)\n- kabi/severities: Whitelist libceph and rbd (bsc#964727).\n- kabi: kgr, add reserved fields.\n- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).\n- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).\n- kgr: add TAINT_KGRAFT.\n- kgr: add kgraft annotation to hwrng kthread.\n- kgr: add kgraft annotations to kthreads' wait_event_freezable() API calls.\n- kgr: add objname to kgr_patch_fun struct.\n- kgr: add sympos and objname to error and debug messages.\n- kgr: add sympos as disambiguator field to kgr_patch_fun structure.\n- kgr: add sympos to sysfs.\n- kgr: call kgr_init_ftrace_ops() only for loaded objects.\n- kgr: change to kallsyms_on_each_symbol iterator.\n- kgr: define pr_fmt and modify all pr_* messages.\n- kgr: do not print error for !abort_if_missing symbols (bnc#943989).\n- kgr: do not return and print an error only if the object is not loaded.\n- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).\n- kgr: fix an asymmetric dealing with delayed module loading.\n- kgr: fix redirection on s390x arch (bsc#903279).\n- kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().\n- kgr: handle btrfs kthreads (bnc#889207).\n- kgr: kmemleak, really mark the kthread safe after an interrupt.\n- kgr: kmemleak, really mark the kthread safe after an interrupt.\n- kgr: log when modifying kernel.\n- kgr: mark kernel unsupported upon patch revert.\n- kgr: mark some more missed kthreads (bnc#962336).\n- kgr: remove abort_if_missing flag.\n- kgr: usb/storage: do not emit thread awakened (bnc#899908).\n- kgraft/gfs2: Do not block livepatching in the log daemon for too long.\n- kgraft/xen: Do not block livepatching in the XEN blkif kthread.\n- libceph: Avoid holding the zero page on ceph_msgr_slab_init errors.\n- libceph: Fix ceph_tcp_sendpage()'s more boolean usage.\n- libceph: MOSDOpReply v7 encoding.\n- libceph: Remove spurious kunmap() of the zero page.\n- libceph: a couple tweaks for wait loops.\n- libceph: add nocephx_sign_messages option.\n- libceph: advertise support for TUNABLES5.\n- libceph: advertise support for keepalive2.\n- libceph: allow setting osd_req_op's flags.\n- libceph: check data_len in ->alloc_msg().\n- libceph: clear messenger auth_retry flag if we fault.\n- libceph: clear msg->con in ceph_msg_release() only.\n- libceph: do not access invalid memory in keepalive2 path.\n- libceph: do not spam dmesg with stray reply warnings.\n- libceph: drop authorizer check from cephx msg signing routines.\n- libceph: evaluate osd_req_op_data() arguments only once.\n- libceph: fix authorizer invalidation, take 2.\n- libceph: fix ceph_msg_revoke().\n- libceph: fix wrong name 'Ceph filesystem for Linux'.\n- libceph: introduce ceph_x_authorizer_cleanup().\n- libceph: invalidate AUTH in addition to a service ticket.\n- libceph: kill off ceph_x_ticket_handler::validity.\n- libceph: move ceph_file_layout helpers to ceph_fs.h.\n- libceph: msg signing callouts do not need con argument.\n- libceph: nuke time_sub().\n- libceph: properly release STAT request's raw_data_in.\n- libceph: remove con argument in handle_reply().\n- libceph: remove outdated comment.\n- libceph: remove the unused macro AES_KEY_SIZE.\n- libceph: rename con_work() to ceph_con_workfn().\n- libceph: set 'exists' flag for newly up osd.\n- libceph: stop duplicating client fields in messenger.\n- libceph: store timeouts in jiffies, verify user input.\n- libceph: treat sockaddr_storage with uninitialized family as blank.\n- libceph: use keepalive2 to verify the mon session is alive.\n- libceph: use list_for_each_entry_safe.\n- libceph: use list_next_entry instead of list_entry_next.\n- libceph: use local variable cursor instead of &msg->cursor.\n- libceph: use the right footer size when skipping a message.\n- libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).\n- mds: check cap ID when handling cap export message.\n- mmc: Allow forward compatibility for eMMC (bnc#966054).\n- mmc: sdhci: Allow for irq being shared (bnc#977582).\n- mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).\n- nfs-rdma: Fix for FMR leaks (bsc#908151).\n- nfs: fix high load average due to callback thread sleeping (bsc#971170).\n- nvme: fix max_segments integer truncation (bsc#676471).\n- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).\n- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).\n- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).\n- pipe: limit the per-user amount of pages allocated in pipes (bsc#970948).\n- powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).\n- powerpc/book3s64: Remove __end_handlers marker (bsc#976821).\n- rbd: bump queue_max_segments.\n- rbd: delete an unnecessary check before rbd_dev_destroy().\n- rbd: do not free rbd_dev outside of the release callback.\n- rbd: do not put snap_context twice in rbd_queue_workfn().\n- rbd: drop null test before destroy functions.\n- rbd: plug rbd_dev->header.object_prefix memory leak.\n- rbd: rbd_wq comment is obsolete.\n- rbd: remove duplicate calls to rbd_dev_mapping_clear().\n- rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails.\n- rbd: set device_type::release instead of device::release.\n- rbd: set max_sectors explicitly.\n- rbd: store rbd_options in rbd_device.\n- rbd: terminate rbd_opts_tokens with Opt_err.\n- rbd: timeout watch teardown on unmap with mount_timeout.\n- rbd: use GFP_NOIO consistently for request allocations (bsc#971159).\n- rbd: use writefull op for object size writes.\n- reduce m_start() cost.. (bsc#966573).\n- s390/compat: correct restore of high gprs on signal return (bnc#968497, LTC#137571).\n- s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413).\n- s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).\n- s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).\n- s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).\n- s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).\n- s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#974692, LTC#139401).\n- s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).\n- s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).\n- s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).\n- s390/zcrypt: HWRNG registration cause kernel panic on CEX hotplug (bnc#968497, LTC#138409).\n- scsi-bnx2fc-handle_scsi_retry_delay\n- scsi-bnx2fc-soft_lockup_when_rmmod\n- scsi: Add intermediate STARGET_REMOVE state to scsi_target_state (bsc#970609).\n- scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).\n- sd: get disk reference in sd_check_events() (bnc#897662).\n- supported.conf: Add bridge.ko for OpenStack (bsc#971600)\n- supported.conf: add pci-hyperv\n- supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461)\n- svcrdma: Fence LOCAL_INV work requests (bsc#908151).\n- svcrdma: advertise the correct max payload (bsc#908151).\n- svcrdma: fix offset calculation for non-page aligned sge entries (bsc#908151).\n- svcrdma: fix printk when memory allocation fails (bsc#908151).\n- svcrdma: refactor marshalling logic (bsc#908151).\n- svcrdma: send_write() must not overflow the device's max sge (bsc#908151).\n- target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872).\n- target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872).\n- target: Fix LUN_RESET active TMR descriptor handling (bsc#962872).\n- target: Fix TAS handling for multi-session se_node_acls (bsc#962872).\n- target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872).\n- target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872).\n- tcp: convert cached rtt from usec to jiffies when feeding initial rto (bsc#937086).\n- vgaarb: Add more context to error messages (bsc#976868).\n- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).\n- xprtrdma: Allocate missing pagelist (bsc#908151).\n- xprtrdma: Avoid deadlock when credit window is reset (bsc#908151).\n- xprtrdma: Disconnect on registration failure (bsc#908151).\n- xprtrdma: Ensure ia->ri_id->qp is not NULL when reconnecting (bsc#908151).\n- xprtrdma: Fall back to MTHCAFMR when FRMR is not supported (bsc#908151).\n- xprtrdma: Limit work done by completion handler (bsc#908151).\n- xprtrdma: Make rpcrdma_ep_destroy() return void (bsc#908151).\n- xprtrdma: RPC/RDMA must invoke xprt_wake_pending_tasks() in process context (bsc#908151).\n- xprtrdma: Reduce the number of hardway buffer allocations (bsc#908151).\n- xprtrdma: Remove BOUNCEBUFFERS memory registration mode (bsc#908151).\n- xprtrdma: Remove BUG_ON() call sites (bsc#908151).\n- xprtrdma: Remove MEMWINDOWS registration modes (bsc#908151).\n- xprtrdma: Remove REGISTER memory registration mode (bsc#908151).\n- xprtrdma: Remove Tavor MTU setting (bsc#908151).\n- xprtrdma: Reset connection timeout after successful reconnect (bsc#908151).\n- xprtrdma: Simplify rpcrdma_deregister_external() synopsis (bsc#908151).\n- xprtrdma: Split the completion queue (bsc#908151).\n- xprtrdma: Use macros for reconnection timeout constants (bsc#908151).\n- xprtrdma: mind the device's max fast register page list depth (bsc#908151).\n- xprtrdma: mount reports 'Invalid mount option' if memreg mode not supported (bsc#908151).\n- xprtrmda: Reduce calls to ib_poll_cq() in completion handlers (bsc#908151).\n- xprtrmda: Reduce lock contention in completion handlers (bsc#908151).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-DESKTOP-12-SP1-2016-1004,SUSE-SLE-Live-Patching-12-2016-1004,SUSE-SLE-Module-Public-Cloud-12-2016-1004,SUSE-SLE-SDK-12-SP1-2016-1004,SUSE-SLE-SERVER-12-SP1-2016-1004,SUSE-SLE-WE-12-SP1-2016-1004", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1696-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:1696-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20161696-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:1696-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002139.html", }, { category: "self", summary: "SUSE Bug 662458", url: "https://bugzilla.suse.com/662458", }, { category: "self", summary: "SUSE Bug 676471", url: "https://bugzilla.suse.com/676471", }, { category: "self", summary: "SUSE Bug 889207", url: "https://bugzilla.suse.com/889207", }, { category: "self", summary: "SUSE Bug 897662", url: "https://bugzilla.suse.com/897662", }, { category: "self", summary: "SUSE Bug 899908", url: "https://bugzilla.suse.com/899908", }, { category: "self", summary: "SUSE Bug 903279", url: "https://bugzilla.suse.com/903279", }, { category: "self", summary: "SUSE Bug 908151", url: "https://bugzilla.suse.com/908151", }, { category: "self", summary: "SUSE Bug 928547", url: "https://bugzilla.suse.com/928547", }, { category: "self", summary: "SUSE Bug 931448", url: "https://bugzilla.suse.com/931448", }, { category: "self", summary: "SUSE Bug 937086", url: "https://bugzilla.suse.com/937086", }, { category: "self", summary: "SUSE Bug 940413", url: "https://bugzilla.suse.com/940413", }, { category: "self", summary: "SUSE Bug 942262", url: "https://bugzilla.suse.com/942262", }, { category: "self", summary: "SUSE Bug 943989", url: "https://bugzilla.suse.com/943989", }, { category: "self", summary: "SUSE Bug 944309", url: "https://bugzilla.suse.com/944309", }, { category: "self", summary: "SUSE Bug 945345", url: "https://bugzilla.suse.com/945345", }, { category: "self", summary: "SUSE Bug 951844", url: "https://bugzilla.suse.com/951844", }, { category: "self", summary: "SUSE Bug 953233", url: "https://bugzilla.suse.com/953233", }, { category: "self", summary: "SUSE Bug 957805", url: "https://bugzilla.suse.com/957805", }, { category: "self", summary: "SUSE Bug 958390", url: "https://bugzilla.suse.com/958390", }, { category: "self", summary: "SUSE Bug 959514", url: "https://bugzilla.suse.com/959514", }, { category: "self", summary: "SUSE Bug 960857", url: "https://bugzilla.suse.com/960857", }, { category: "self", summary: "SUSE Bug 962336", url: "https://bugzilla.suse.com/962336", }, { category: "self", summary: "SUSE Bug 962846", url: "https://bugzilla.suse.com/962846", }, { category: "self", summary: "SUSE Bug 962872", url: "https://bugzilla.suse.com/962872", }, { category: "self", summary: "SUSE Bug 963572", url: "https://bugzilla.suse.com/963572", }, { category: "self", summary: "SUSE Bug 964461", url: "https://bugzilla.suse.com/964461", }, { category: "self", summary: "SUSE Bug 964727", url: "https://bugzilla.suse.com/964727", }, { category: "self", summary: "SUSE Bug 965319", url: "https://bugzilla.suse.com/965319", }, { category: "self", summary: "SUSE Bug 966054", url: "https://bugzilla.suse.com/966054", }, { category: "self", summary: "SUSE Bug 966573", url: "https://bugzilla.suse.com/966573", }, { category: "self", summary: "SUSE Bug 967640", url: "https://bugzilla.suse.com/967640", }, { category: "self", summary: "SUSE Bug 968497", url: "https://bugzilla.suse.com/968497", }, { category: "self", summary: "SUSE Bug 968687", url: "https://bugzilla.suse.com/968687", }, { category: "self", summary: "SUSE Bug 968812", url: "https://bugzilla.suse.com/968812", }, { category: "self", summary: "SUSE Bug 968813", url: "https://bugzilla.suse.com/968813", }, { category: "self", summary: "SUSE Bug 969016", url: "https://bugzilla.suse.com/969016", }, { category: "self", summary: "SUSE Bug 970604", url: "https://bugzilla.suse.com/970604", }, { category: "self", summary: "SUSE Bug 970609", url: "https://bugzilla.suse.com/970609", }, { category: "self", summary: "SUSE Bug 970892", url: "https://bugzilla.suse.com/970892", }, { category: "self", summary: "SUSE Bug 970911", url: "https://bugzilla.suse.com/970911", }, { category: "self", summary: "SUSE Bug 970948", url: "https://bugzilla.suse.com/970948", }, { category: "self", summary: "SUSE Bug 970955", url: "https://bugzilla.suse.com/970955", }, { category: "self", summary: "SUSE Bug 970956", url: "https://bugzilla.suse.com/970956", }, { category: "self", summary: "SUSE Bug 970958", url: "https://bugzilla.suse.com/970958", }, { category: "self", summary: "SUSE Bug 970970", url: "https://bugzilla.suse.com/970970", }, { category: "self", summary: "SUSE Bug 971049", url: "https://bugzilla.suse.com/971049", }, { category: "self", summary: "SUSE Bug 971124", url: "https://bugzilla.suse.com/971124", }, { category: "self", summary: "SUSE Bug 971126", url: "https://bugzilla.suse.com/971126", }, { category: "self", summary: "SUSE Bug 971159", url: "https://bugzilla.suse.com/971159", }, { category: "self", summary: "SUSE Bug 971170", url: "https://bugzilla.suse.com/971170", }, { category: "self", summary: "SUSE Bug 971600", url: "https://bugzilla.suse.com/971600", }, { category: "self", summary: "SUSE Bug 971628", url: "https://bugzilla.suse.com/971628", }, { category: "self", summary: "SUSE Bug 971793", url: "https://bugzilla.suse.com/971793", }, { category: "self", summary: "SUSE Bug 971947", url: "https://bugzilla.suse.com/971947", }, { category: "self", summary: "SUSE Bug 972003", url: "https://bugzilla.suse.com/972003", }, { category: "self", summary: "SUSE Bug 972068", url: "https://bugzilla.suse.com/972068", }, { category: "self", summary: "SUSE Bug 972174", url: "https://bugzilla.suse.com/972174", }, { category: "self", summary: "SUSE Bug 972780", url: "https://bugzilla.suse.com/972780", }, { category: "self", summary: "SUSE Bug 972844", url: "https://bugzilla.suse.com/972844", }, { category: "self", summary: "SUSE Bug 972891", url: "https://bugzilla.suse.com/972891", }, { category: "self", summary: "SUSE Bug 972951", url: "https://bugzilla.suse.com/972951", }, { category: "self", summary: "SUSE Bug 973378", url: "https://bugzilla.suse.com/973378", }, { category: "self", summary: "SUSE Bug 973556", url: "https://bugzilla.suse.com/973556", }, { category: "self", summary: "SUSE Bug 973855", url: "https://bugzilla.suse.com/973855", }, { category: "self", summary: "SUSE Bug 974418", url: "https://bugzilla.suse.com/974418", }, { category: "self", summary: "SUSE Bug 974646", url: "https://bugzilla.suse.com/974646", }, { category: "self", summary: "SUSE Bug 974692", url: "https://bugzilla.suse.com/974692", }, { category: "self", summary: "SUSE Bug 975371", url: "https://bugzilla.suse.com/975371", }, { category: "self", summary: "SUSE Bug 975488", url: "https://bugzilla.suse.com/975488", }, { category: "self", summary: "SUSE Bug 975772", url: "https://bugzilla.suse.com/975772", }, { category: "self", summary: "SUSE Bug 975945", url: "https://bugzilla.suse.com/975945", }, { category: "self", summary: "SUSE Bug 976739", url: "https://bugzilla.suse.com/976739", }, { category: "self", summary: "SUSE Bug 976821", url: "https://bugzilla.suse.com/976821", }, { category: "self", summary: "SUSE Bug 976868", url: "https://bugzilla.suse.com/976868", }, { category: "self", summary: "SUSE Bug 977582", url: "https://bugzilla.suse.com/977582", }, { category: "self", summary: "SUSE Bug 977685", url: "https://bugzilla.suse.com/977685", }, { category: "self", summary: "SUSE Bug 978401", url: "https://bugzilla.suse.com/978401", }, { category: "self", summary: "SUSE Bug 978527", url: "https://bugzilla.suse.com/978527", }, { category: "self", summary: "SUSE Bug 978822", url: "https://bugzilla.suse.com/978822", }, { category: "self", summary: "SUSE Bug 979213", url: "https://bugzilla.suse.com/979213", }, { category: "self", summary: "SUSE Bug 979347", url: "https://bugzilla.suse.com/979347", }, { category: "self", summary: "SUSE Bug 983143", url: "https://bugzilla.suse.com/983143", }, { category: "self", summary: "SUSE CVE CVE-2014-9717 page", url: "https://www.suse.com/security/cve/CVE-2014-9717/", }, { category: "self", summary: "SUSE CVE CVE-2016-1583 page", url: "https://www.suse.com/security/cve/CVE-2016-1583/", }, { category: "self", summary: "SUSE CVE CVE-2016-2185 page", url: "https://www.suse.com/security/cve/CVE-2016-2185/", }, { category: "self", summary: "SUSE CVE CVE-2016-2186 page", url: "https://www.suse.com/security/cve/CVE-2016-2186/", }, { category: "self", summary: "SUSE CVE CVE-2016-2188 page", url: "https://www.suse.com/security/cve/CVE-2016-2188/", }, { category: "self", summary: "SUSE CVE CVE-2016-2847 page", url: "https://www.suse.com/security/cve/CVE-2016-2847/", }, { category: "self", summary: "SUSE CVE CVE-2016-3134 page", url: "https://www.suse.com/security/cve/CVE-2016-3134/", }, { category: "self", summary: "SUSE CVE CVE-2016-3136 page", url: "https://www.suse.com/security/cve/CVE-2016-3136/", }, { category: "self", summary: "SUSE CVE CVE-2016-3137 page", url: "https://www.suse.com/security/cve/CVE-2016-3137/", }, { category: "self", summary: "SUSE CVE CVE-2016-3138 page", url: "https://www.suse.com/security/cve/CVE-2016-3138/", }, { category: "self", summary: "SUSE CVE CVE-2016-3140 page", url: "https://www.suse.com/security/cve/CVE-2016-3140/", }, { category: "self", summary: "SUSE CVE CVE-2016-3689 page", url: "https://www.suse.com/security/cve/CVE-2016-3689/", }, { category: "self", summary: "SUSE CVE CVE-2016-3951 page", url: "https://www.suse.com/security/cve/CVE-2016-3951/", }, { category: "self", summary: "SUSE CVE CVE-2016-4482 page", url: "https://www.suse.com/security/cve/CVE-2016-4482/", }, { category: "self", summary: "SUSE CVE CVE-2016-4486 page", url: "https://www.suse.com/security/cve/CVE-2016-4486/", }, { category: "self", summary: "SUSE CVE CVE-2016-4569 page", url: "https://www.suse.com/security/cve/CVE-2016-4569/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2016-06-28T11:02:10Z", generator: { date: "2016-06-28T11:02:10Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:1696-1", initial_release_date: "2016-06-28T11:02:10Z", revision_history: [ { date: "2016-06-28T11:02:10Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-3.12.59-60.41.2.noarch", product: { name: "kernel-devel-3.12.59-60.41.2.noarch", product_id: "kernel-devel-3.12.59-60.41.2.noarch", }, }, { category: "product_version", name: "kernel-macros-3.12.59-60.41.2.noarch", product: { name: "kernel-macros-3.12.59-60.41.2.noarch", product_id: "kernel-macros-3.12.59-60.41.2.noarch", }, }, { category: "product_version", name: "kernel-source-3.12.59-60.41.2.noarch", product: { name: "kernel-source-3.12.59-60.41.2.noarch", product_id: "kernel-source-3.12.59-60.41.2.noarch", }, }, { category: "product_version", name: "kernel-docs-3.12.59-60.41.8.noarch", product: { name: "kernel-docs-3.12.59-60.41.8.noarch", product_id: "kernel-docs-3.12.59-60.41.8.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-obs-build-3.12.59-60.41.2.ppc64le", product: { name: "kernel-obs-build-3.12.59-60.41.2.ppc64le", product_id: "kernel-obs-build-3.12.59-60.41.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-3.12.59-60.41.2.ppc64le", product: { name: "kernel-default-3.12.59-60.41.2.ppc64le", product_id: "kernel-default-3.12.59-60.41.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-3.12.59-60.41.2.ppc64le", product: { name: "kernel-default-base-3.12.59-60.41.2.ppc64le", product_id: "kernel-default-base-3.12.59-60.41.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-3.12.59-60.41.2.ppc64le", product: { name: "kernel-default-devel-3.12.59-60.41.2.ppc64le", product_id: "kernel-default-devel-3.12.59-60.41.2.ppc64le", }, }, { category: "product_version", name: "kernel-syms-3.12.59-60.41.1.ppc64le", product: { name: "kernel-syms-3.12.59-60.41.1.ppc64le", product_id: "kernel-syms-3.12.59-60.41.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-obs-build-3.12.59-60.41.2.s390x", product: { name: "kernel-obs-build-3.12.59-60.41.2.s390x", product_id: "kernel-obs-build-3.12.59-60.41.2.s390x", }, }, { category: "product_version", name: "kernel-default-3.12.59-60.41.2.s390x", product: { name: "kernel-default-3.12.59-60.41.2.s390x", product_id: "kernel-default-3.12.59-60.41.2.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.12.59-60.41.2.s390x", product: { name: "kernel-default-base-3.12.59-60.41.2.s390x", product_id: "kernel-default-base-3.12.59-60.41.2.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.12.59-60.41.2.s390x", product: { name: "kernel-default-devel-3.12.59-60.41.2.s390x", product_id: "kernel-default-devel-3.12.59-60.41.2.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.12.59-60.41.2.s390x", product: { name: "kernel-default-man-3.12.59-60.41.2.s390x", product_id: "kernel-default-man-3.12.59-60.41.2.s390x", }, }, { category: "product_version", name: "kernel-syms-3.12.59-60.41.1.s390x", product: { name: "kernel-syms-3.12.59-60.41.1.s390x", product_id: "kernel-syms-3.12.59-60.41.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-3.12.59-60.41.2.x86_64", product: { name: "kernel-default-3.12.59-60.41.2.x86_64", product_id: "kernel-default-3.12.59-60.41.2.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.12.59-60.41.2.x86_64", product: { name: "kernel-default-devel-3.12.59-60.41.2.x86_64", product_id: "kernel-default-devel-3.12.59-60.41.2.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-3.12.59-60.41.2.x86_64", product: { name: "kernel-default-extra-3.12.59-60.41.2.x86_64", product_id: "kernel-default-extra-3.12.59-60.41.2.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.12.59-60.41.1.x86_64", product: { name: "kernel-syms-3.12.59-60.41.1.x86_64", product_id: "kernel-syms-3.12.59-60.41.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.12.59-60.41.2.x86_64", product: { name: "kernel-xen-3.12.59-60.41.2.x86_64", product_id: "kernel-xen-3.12.59-60.41.2.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.12.59-60.41.2.x86_64", product: { name: "kernel-xen-devel-3.12.59-60.41.2.x86_64", product_id: "kernel-xen-devel-3.12.59-60.41.2.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", product: { name: "kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", product_id: "kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", product: { name: "kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", product_id: "kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-3.12.59-60.41.2.x86_64", product: { name: "kernel-ec2-3.12.59-60.41.2.x86_64", product_id: "kernel-ec2-3.12.59-60.41.2.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.12.59-60.41.2.x86_64", product: { name: "kernel-ec2-devel-3.12.59-60.41.2.x86_64", product_id: "kernel-ec2-devel-3.12.59-60.41.2.x86_64", }, }, { category: "product_version", name: "kernel-ec2-extra-3.12.59-60.41.2.x86_64", product: { name: "kernel-ec2-extra-3.12.59-60.41.2.x86_64", product_id: "kernel-ec2-extra-3.12.59-60.41.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-3.12.59-60.41.2.x86_64", product: { name: "kernel-obs-build-3.12.59-60.41.2.x86_64", product_id: "kernel-obs-build-3.12.59-60.41.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.12.59-60.41.2.x86_64", product: { name: "kernel-default-base-3.12.59-60.41.2.x86_64", product_id: "kernel-default-base-3.12.59-60.41.2.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.12.59-60.41.2.x86_64", product: { name: "kernel-xen-base-3.12.59-60.41.2.x86_64", product_id: "kernel-xen-base-3.12.59-60.41.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP1", product: { name: "SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12", product: { name: "SUSE Linux Enterprise Live Patching 12", product_id: "SUSE Linux Enterprise Live Patching 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 12", product: { name: "SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP1", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1", product: { name: "SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP1", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP1", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-default-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-default-devel-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-default-extra-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", }, product_reference: "kernel-devel-3.12.59-60.41.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", }, product_reference: "kernel-macros-3.12.59-60.41.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", }, product_reference: "kernel-source-3.12.59-60.41.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.59-60.41.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", }, product_reference: "kernel-syms-3.12.59-60.41.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-xen-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-xen-devel-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", product_id: "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", }, product_reference: "kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", product_id: "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", }, product_reference: "kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-ec2-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-ec2-devel-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-extra-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-ec2-extra-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-3.12.59-60.41.8.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", }, product_reference: "kernel-docs-3.12.59-60.41.8.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", }, product_reference: "kernel-obs-build-3.12.59-60.41.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", }, product_reference: "kernel-obs-build-3.12.59-60.41.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-obs-build-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", }, product_reference: "kernel-default-3.12.59-60.41.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", }, product_reference: "kernel-default-3.12.59-60.41.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-default-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", }, product_reference: "kernel-default-base-3.12.59-60.41.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", }, product_reference: "kernel-default-base-3.12.59-60.41.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-default-base-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", }, product_reference: "kernel-default-devel-3.12.59-60.41.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", }, product_reference: "kernel-default-devel-3.12.59-60.41.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-default-devel-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", }, product_reference: "kernel-default-man-3.12.59-60.41.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", }, product_reference: "kernel-devel-3.12.59-60.41.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", }, product_reference: "kernel-macros-3.12.59-60.41.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", }, product_reference: "kernel-source-3.12.59-60.41.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.59-60.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", }, product_reference: "kernel-syms-3.12.59-60.41.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.59-60.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", }, product_reference: "kernel-syms-3.12.59-60.41.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.59-60.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", }, product_reference: "kernel-syms-3.12.59-60.41.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-xen-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-xen-base-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-xen-devel-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", }, product_reference: "kernel-default-3.12.59-60.41.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", }, product_reference: "kernel-default-3.12.59-60.41.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-default-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", }, product_reference: "kernel-default-base-3.12.59-60.41.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", }, product_reference: "kernel-default-base-3.12.59-60.41.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-default-base-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", }, product_reference: "kernel-default-devel-3.12.59-60.41.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", }, product_reference: "kernel-default-devel-3.12.59-60.41.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-default-devel-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", }, product_reference: "kernel-default-man-3.12.59-60.41.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", }, product_reference: "kernel-devel-3.12.59-60.41.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", }, product_reference: "kernel-macros-3.12.59-60.41.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", }, product_reference: "kernel-source-3.12.59-60.41.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.59-60.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", }, product_reference: "kernel-syms-3.12.59-60.41.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.59-60.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", }, product_reference: "kernel-syms-3.12.59-60.41.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.59-60.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", }, product_reference: "kernel-syms-3.12.59-60.41.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-xen-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-xen-base-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-xen-devel-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", }, product_reference: "kernel-default-extra-3.12.59-60.41.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2014-9717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9717", }, ], notes: [ { category: "general", text: "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9717", url: "https://www.suse.com/security/cve/CVE-2014-9717", }, { category: "external", summary: "SUSE Bug 928547 for CVE-2014-9717", url: "https://bugzilla.suse.com/928547", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "low", }, ], title: "CVE-2014-9717", }, { cve: "CVE-2016-1583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1583", }, ], notes: [ { category: "general", text: "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1583", url: "https://www.suse.com/security/cve/CVE-2016-1583", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-1583", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-1583", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 983143 for CVE-2016-1583", url: "https://bugzilla.suse.com/983143", }, { category: "external", summary: "SUSE Bug 983144 for CVE-2016-1583", url: "https://bugzilla.suse.com/983144", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "important", }, ], title: "CVE-2016-1583", }, { cve: "CVE-2016-2185", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2185", }, ], notes: [ { category: "general", text: "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2185", url: "https://www.suse.com/security/cve/CVE-2016-2185", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2185", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 971124 for CVE-2016-2185", url: "https://bugzilla.suse.com/971124", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "moderate", }, ], title: "CVE-2016-2185", }, { cve: "CVE-2016-2186", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2186", }, ], notes: [ { category: "general", text: "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2186", url: "https://www.suse.com/security/cve/CVE-2016-2186", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2186", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970958 for CVE-2016-2186", url: "https://bugzilla.suse.com/970958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "moderate", }, ], title: "CVE-2016-2186", }, { cve: "CVE-2016-2188", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2188", }, ], notes: [ { category: "general", text: "The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2188", url: "https://www.suse.com/security/cve/CVE-2016-2188", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2188", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1067912 for CVE-2016-2188", url: "https://bugzilla.suse.com/1067912", }, { category: "external", summary: "SUSE Bug 1132190 for CVE-2016-2188", url: "https://bugzilla.suse.com/1132190", }, { category: "external", summary: "SUSE Bug 970956 for CVE-2016-2188", url: "https://bugzilla.suse.com/970956", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "moderate", }, ], title: "CVE-2016-2188", }, { cve: "CVE-2016-2847", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2847", }, ], notes: [ { category: "general", text: "fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2847", url: "https://www.suse.com/security/cve/CVE-2016-2847", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2847", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970948 for CVE-2016-2847", url: "https://bugzilla.suse.com/970948", }, { category: "external", summary: "SUSE Bug 974646 for CVE-2016-2847", url: "https://bugzilla.suse.com/974646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "moderate", }, ], title: "CVE-2016-2847", }, { cve: "CVE-2016-3134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3134", }, ], notes: [ { category: "general", text: "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3134", url: "https://www.suse.com/security/cve/CVE-2016-3134", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-3134", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-3134", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-3134", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 971126 for CVE-2016-3134", url: "https://bugzilla.suse.com/971126", }, { category: "external", summary: "SUSE Bug 971793 for CVE-2016-3134", url: "https://bugzilla.suse.com/971793", }, { category: "external", summary: "SUSE Bug 986362 for CVE-2016-3134", url: "https://bugzilla.suse.com/986362", }, { category: "external", summary: "SUSE Bug 986365 for CVE-2016-3134", url: "https://bugzilla.suse.com/986365", }, { category: "external", summary: "SUSE Bug 986377 for CVE-2016-3134", url: "https://bugzilla.suse.com/986377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "moderate", }, ], title: "CVE-2016-3134", }, { cve: "CVE-2016-3136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3136", }, ], notes: [ { category: "general", text: "The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3136", url: "https://www.suse.com/security/cve/CVE-2016-3136", }, { category: "external", summary: "SUSE Bug 970955 for CVE-2016-3136", url: "https://bugzilla.suse.com/970955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "moderate", }, ], title: "CVE-2016-3136", }, { cve: "CVE-2016-3137", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3137", }, ], notes: [ { category: "general", text: "drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3137", url: "https://www.suse.com/security/cve/CVE-2016-3137", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-3137", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970970 for CVE-2016-3137", url: "https://bugzilla.suse.com/970970", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "moderate", }, ], title: "CVE-2016-3137", }, { cve: "CVE-2016-3138", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3138", }, ], notes: [ { category: "general", text: "The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3138", url: "https://www.suse.com/security/cve/CVE-2016-3138", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-3138", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970911 for CVE-2016-3138", url: "https://bugzilla.suse.com/970911", }, { category: "external", summary: "SUSE Bug 970970 for CVE-2016-3138", url: "https://bugzilla.suse.com/970970", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "moderate", }, ], title: "CVE-2016-3138", }, { cve: "CVE-2016-3140", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3140", }, ], notes: [ { category: "general", text: "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3140", url: "https://www.suse.com/security/cve/CVE-2016-3140", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-3140", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970892 for CVE-2016-3140", url: "https://bugzilla.suse.com/970892", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "moderate", }, ], title: "CVE-2016-3140", }, { cve: "CVE-2016-3689", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3689", }, ], notes: [ { category: "general", text: "The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3689", url: "https://www.suse.com/security/cve/CVE-2016-3689", }, { category: "external", summary: "SUSE Bug 971628 for CVE-2016-3689", url: "https://bugzilla.suse.com/971628", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "moderate", }, ], title: "CVE-2016-3689", }, { cve: "CVE-2016-3951", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3951", }, ], notes: [ { category: "general", text: "Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3951", url: "https://www.suse.com/security/cve/CVE-2016-3951", }, { category: "external", summary: "SUSE Bug 974418 for CVE-2016-3951", url: "https://bugzilla.suse.com/974418", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "moderate", }, ], title: "CVE-2016-3951", }, { cve: "CVE-2016-4482", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4482", }, ], notes: [ { category: "general", text: "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4482", url: "https://www.suse.com/security/cve/CVE-2016-4482", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4482", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 978401 for CVE-2016-4482", url: "https://bugzilla.suse.com/978401", }, { category: "external", summary: "SUSE Bug 978445 for CVE-2016-4482", url: "https://bugzilla.suse.com/978445", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "low", }, ], title: "CVE-2016-4482", }, { cve: "CVE-2016-4486", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4486", }, ], notes: [ { category: "general", text: "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4486", url: "https://www.suse.com/security/cve/CVE-2016-4486", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4486", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 978822 for CVE-2016-4486", url: "https://bugzilla.suse.com/978822", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "low", }, ], title: "CVE-2016-4486", }, { cve: "CVE-2016-4569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4569", }, ], notes: [ { category: "general", text: "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4569", url: "https://www.suse.com/security/cve/CVE-2016-4569", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4569", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 979213 for CVE-2016-4569", url: "https://bugzilla.suse.com/979213", }, { category: "external", summary: "SUSE Bug 979879 for CVE-2016-4569", url: "https://bugzilla.suse.com/979879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-28T11:02:10Z", details: "low", }, ], title: "CVE-2016-4569", }, ], }
suse-su-2016:1690-1
Vulnerability from csaf_suse
Published
2016-06-27 13:27
Modified
2016-06-27 13:27
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to 3.12.60 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system called without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).
- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).
- CVE-2016-0758: Fix ASN.1 indefinite length object parsing (bsc#979867).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h. (bnc#970504)
- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).
- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandled destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).
- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).
- CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628).
- CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-5244: Fixed an infoleak in rds_inc_info_copy (bsc#983213).
The following non-security bugs were fixed:
- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
- ALSA: timer: Call notifier in the same spinlock (bsc#973378).
- ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378).
- ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378).
- ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).
- Btrfs-8394-qgroup-Account-data-space-in-more-proper-timin.patch: (bsc#963193).
- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).
- Btrfs: do not use src fd for printk (bsc#980348).
- Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).
- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).
- Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844).
- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).
- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951).
- Btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#969439).
- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).
- Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#972951).
- Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371).
- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).
- CacheFiles: Handle object being killed before being set up (bsc#971049).
- Ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).
- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).
- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).
- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).
- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).
- FS-Cache: Out of line fscache_operation_init() (bsc#971049).
- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).
- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).
- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).
- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).
- FS-Cache: Timeout for releasepage() (bsc#971049).
- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).
- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- Fix kabi issue (bsc#971049).
- Fix kmalloc overflow in LPFC driver at large core count (bsc#969690).
- Fix problem with setting ACL on directories (bsc#967251).
- Input: i8042 - lower log level for 'no controller' message (bsc#945345).
- KVM: SVM: add rdmsr support for AMD event registers (bsc#968448).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- NFSv4.1: do not use machine credentials for CLOSE when using 'sec=sys' (bsc#972003).
- PCI/AER: Fix aer_inject error codes (bsc#931448).
- PCI/AER: Log actual error causes in aer_inject (bsc#931448).
- PCI/AER: Log aer_inject error injections (bsc#931448).
- PCI/AER: Use dev_warn() in aer_inject (bsc#931448).
- Revert 'libata: Align ata_device's id on a cacheline'.
- Revert 'net/ipv6: add sysctl option accept_ra_min_hop_limit'.
- USB: quirk to stop runtime PM for Intel 7260 (bnc#984456).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).
- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.drivers/drm-ast-Initialize-data-needed-to-map-fbdev-memory.patch (bnc#880007). Fix refs and upstream status.
- Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570).
- Update patches.suse/kgr-0102-add-TAINT_KGRAFT.patch (bsc#974406).
- acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- acpi: Disable APEI error injection if securelevel is set (bsc#972891).
- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dmapi: fix dm_open_by_handle_rvp taking an extra ref to mnt (bsc#967292).
- drm/core: Preserve the framebuffer after removing it (bsc#968812).
- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).
- drm/mgag200: Add support for a new rev of G200e (bsc#983904).
- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).
- drm/mgag200: remove unused variables (bsc#983904).
- drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813).
- drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813).
- drm: qxl: Workaround for buggy user-space (bsc#981344).
- efifb: Fix 16 color palette entry calculation (bsc#983318).
- ehci-pci: enable interrupt on BayTrail (bnc#947337).
- enic: set netdev->vlan_features (bsc#966245).
- ext4: fix races between page faults and hole punching (bsc#972174).
- ext4: fix races of writeback with punch hole and zero range (bsc#972174).
- fix: print ext4 mountopt data_err=abort correctly (bsc#969735).
- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).
- fs, seqfile: always allow oom killer (bnc#968687).
- fs/pipe.c: skip file_update_time on frozen fs (bsc#975488).
- hid-elo: kill not flush the work (bnc#982354).
- ibmvscsi: Remove unsupported host config MAD (bsc#973556).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().
- kABI: protect enum enclosure_component_type.
- kABI: protect function file_open_root.
- kABI: protect include in evm.
- kABI: protect struct dm_exception_store_type.
- kABI: protect struct fib_nh_exception.
- kABI: protect struct module.
- kABI: protect struct rq.
- kABI: protect struct sched_class.
- kABI: protect struct scm_creds.
- kABI: protect struct user_struct.
- kABI: protect struct user_struct.
- kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573).
- kabi/severities: Whitelist libceph and rbd (bsc#964727).
- kabi: kgr, add reserved fields
- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- kgr: add TAINT_KGRAFT
- kgr: add kgraft annotation to hwrng kthread.
- kgr: add kgraft annotations to kthreads' wait_event_freezable() API calls.
- kgr: add objname to kgr_patch_fun struct.
- kgr: add sympos and objname to error and debug messages.
- kgr: add sympos as disambiguator field to kgr_patch_fun structure.
- kgr: add sympos to sysfs.
- kgr: call kgr_init_ftrace_ops() only for loaded objects.
- kgr: change to kallsyms_on_each_symbol iterator.
- kgr: define pr_fmt and modify all pr_* messages.
- kgr: do not print error for !abort_if_missing symbols (bnc#943989).
- kgr: do not return and print an error only if the object is not loaded.
- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).
- kgr: fix an asymmetric dealing with delayed module loading.
- kgr: fix redirection on s390x arch (bsc#903279).
- kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().
- kgr: handle btrfs kthreads (bnc#889207).
- kgr: kmemleak, really mark the kthread safe after an interrupt.
- kgr: log when modifying kernel.
- kgr: mark some more missed kthreads (bnc#962336).
- kgr: remove abort_if_missing flag.
- kgr: usb/storage: do not emit thread awakened (bnc#899908).
- kgraft/gfs2: Do not block livepatching in the log daemon for too long.
- kgraft/xen: Do not block livepatching in the XEN blkif kthread.
- libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).
- memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571).
- mld, igmp: Fix reserved tailroom calculation (bsc#956852).
- mmc: Allow forward compatibility for eMMC (bnc#966054).
- mmc: sdhci: Allow for irq being shared (bnc#977582).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).
- net: Start with correct mac_len in skb_network_protocol (bsc#968667).
- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).
- net: fix wrong mac_len calculation for vlans (bsc#968667).
- net: irda: Fix use-after-free in irtty_open() (bnc#967903).
- nfs4: treat lock owners as opaque values (bnc#968141).
- nfs: fix high load average due to callback thread sleeping (bsc#971170).
- nfsd: fix nfsd_setattr return code for HSM (bsc#969992).
- nvme: fix max_segments integer truncation (bsc#676471).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- perf, nmi: Fix unknown NMI warning (bsc#968512).
- pipe: limit the per-user amount of pages allocated in pipes (bsc#970948).
- rbd: do not log miscompare as an error (bsc#970062).
- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).
- rbd: report unsupported features to syslog (bsc#979169).
- rbd: use GFP_NOIO consistently for request allocations (bsc#971159).
- reduce m_start() cost.. (bsc#966573).
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.
- s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413).
- sched/x86: Fix up typo in topology detection (bsc#974165).
- scsi: proper state checking and module refcount handling in scsi_device_get (boo#966831).
- series.conf: move netfilter section at the end of core networking
- supported.conf: Add bridge.ko for OpenStack (bsc#971600)
- supported.conf: Add isofs to -base (bsc#969655).
- supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461)
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
- target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872).
- target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872).
- target: Fix LUN_RESET active TMR descriptor handling (bsc#962872).
- target: Fix TAS handling for multi-session se_node_acls (bsc#962872).
- target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872).
- target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872).
- vgaarb: Add more context to error messages (bsc#976868).
- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).
- x86/efi: parse_efi_setup() build fix (bsc#979485).
- x86: standardize mmap_rnd() usage (bnc#974308).
- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- xfs/dmapi: drop lock over synchronous XFS_SEND_DATA events (bsc#969993).
- xfs/dmapi: propertly send postcreate event (bsc#967299).
Patchnames
SUSE-SLE-DESKTOP-12-2016-1001,SUSE-SLE-Live-Patching-12-2016-1001,SUSE-SLE-Module-Public-Cloud-12-2016-1001,SUSE-SLE-SDK-12-2016-1001,SUSE-SLE-SERVER-12-2016-1001,SUSE-SLE-WE-12-2016-1001
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 kernel was updated to 3.12.60 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system called without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).\n- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).\n- CVE-2016-0758: Fix ASN.1 indefinite length object parsing (bsc#979867).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h. (bnc#970504)\n- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).\n- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).\n- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).\n- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).\n- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).\n- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n- CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955).\n- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).\n- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).\n- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).\n- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).\n- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandled destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).\n- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).\n- CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628).\n- CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-5244: Fixed an infoleak in rds_inc_info_copy (bsc#983213).\n\nThe following non-security bugs were fixed:\n- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).\n- ALSA: timer: Call notifier in the same spinlock (bsc#973378).\n- ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378).\n- ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378).\n- ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).\n- Btrfs-8394-qgroup-Account-data-space-in-more-proper-timin.patch: (bsc#963193).\n- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).\n- Btrfs: do not use src fd for printk (bsc#980348).\n- Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855).\n- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).\n- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).\n- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).\n- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).\n- Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844).\n- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).\n- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).\n- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951).\n- Btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#969439).\n- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).\n- Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#972951).\n- Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371).\n- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).\n- CacheFiles: Handle object being killed before being set up (bsc#971049).\n- Ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).\n- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).\n- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).\n- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).\n- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).\n- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).\n- FS-Cache: Out of line fscache_operation_init() (bsc#971049).\n- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).\n- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).\n- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).\n- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).\n- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).\n- FS-Cache: Timeout for releasepage() (bsc#971049).\n- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).\n- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).\n- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- Fix kabi issue (bsc#971049).\n- Fix kmalloc overflow in LPFC driver at large core count (bsc#969690).\n- Fix problem with setting ACL on directories (bsc#967251).\n- Input: i8042 - lower log level for 'no controller' message (bsc#945345).\n- KVM: SVM: add rdmsr support for AMD event registers (bsc#968448).\n- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).\n- NFSv4.1: do not use machine credentials for CLOSE when using 'sec=sys' (bsc#972003).\n- PCI/AER: Fix aer_inject error codes (bsc#931448).\n- PCI/AER: Log actual error causes in aer_inject (bsc#931448).\n- PCI/AER: Log aer_inject error injections (bsc#931448).\n- PCI/AER: Use dev_warn() in aer_inject (bsc#931448).\n- Revert 'libata: Align ata_device's id on a cacheline'.\n- Revert 'net/ipv6: add sysctl option accept_ra_min_hop_limit'.\n- USB: quirk to stop runtime PM for Intel 7260 (bnc#984456).\n- USB: usbip: fix potential out-of-bounds write (bnc#975945).\n- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).\n- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.\n- Update patches.drivers/drm-ast-Initialize-data-needed-to-map-fbdev-memory.patch (bnc#880007). Fix refs and upstream status.\n- Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570).\n- Update patches.suse/kgr-0102-add-TAINT_KGRAFT.patch (bsc#974406).\n- acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).\n- acpi: Disable APEI error injection if securelevel is set (bsc#972891).\n- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).\n- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).\n- dmapi: fix dm_open_by_handle_rvp taking an extra ref to mnt (bsc#967292).\n- drm/core: Preserve the framebuffer after removing it (bsc#968812).\n- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).\n- drm/mgag200: Add support for a new rev of G200e (bsc#983904).\n- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).\n- drm/mgag200: remove unused variables (bsc#983904).\n- drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813).\n- drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813).\n- drm: qxl: Workaround for buggy user-space (bsc#981344).\n- efifb: Fix 16 color palette entry calculation (bsc#983318).\n- ehci-pci: enable interrupt on BayTrail (bnc#947337).\n- enic: set netdev->vlan_features (bsc#966245).\n- ext4: fix races between page faults and hole punching (bsc#972174).\n- ext4: fix races of writeback with punch hole and zero range (bsc#972174).\n- fix: print ext4 mountopt data_err=abort correctly (bsc#969735).\n- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).\n- fs, seqfile: always allow oom killer (bnc#968687).\n- fs/pipe.c: skip file_update_time on frozen fs (bsc#975488).\n- hid-elo: kill not flush the work (bnc#982354).\n- ibmvscsi: Remove unsupported host config MAD (bsc#973556).\n- ipv6: make fib6 serial number per namespace (bsc#965319).\n- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).\n- ipv6: per netns FIB garbage collection (bsc#965319).\n- ipv6: per netns fib6 walkers (bsc#965319).\n- ipv6: replace global gc_args with local variable (bsc#965319).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().\n- kABI: protect enum enclosure_component_type.\n- kABI: protect function file_open_root.\n- kABI: protect include in evm.\n- kABI: protect struct dm_exception_store_type.\n- kABI: protect struct fib_nh_exception.\n- kABI: protect struct module.\n- kABI: protect struct rq.\n- kABI: protect struct sched_class.\n- kABI: protect struct scm_creds.\n- kABI: protect struct user_struct.\n- kABI: protect struct user_struct.\n- kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573).\n- kabi/severities: Whitelist libceph and rbd (bsc#964727).\n- kabi: kgr, add reserved fields\n- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).\n- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).\n- kgr: add TAINT_KGRAFT\n- kgr: add kgraft annotation to hwrng kthread.\n- kgr: add kgraft annotations to kthreads' wait_event_freezable() API calls.\n- kgr: add objname to kgr_patch_fun struct.\n- kgr: add sympos and objname to error and debug messages.\n- kgr: add sympos as disambiguator field to kgr_patch_fun structure.\n- kgr: add sympos to sysfs.\n- kgr: call kgr_init_ftrace_ops() only for loaded objects.\n- kgr: change to kallsyms_on_each_symbol iterator.\n- kgr: define pr_fmt and modify all pr_* messages.\n- kgr: do not print error for !abort_if_missing symbols (bnc#943989).\n- kgr: do not return and print an error only if the object is not loaded.\n- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).\n- kgr: fix an asymmetric dealing with delayed module loading.\n- kgr: fix redirection on s390x arch (bsc#903279).\n- kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().\n- kgr: handle btrfs kthreads (bnc#889207).\n- kgr: kmemleak, really mark the kthread safe after an interrupt.\n- kgr: log when modifying kernel.\n- kgr: mark some more missed kthreads (bnc#962336).\n- kgr: remove abort_if_missing flag.\n- kgr: usb/storage: do not emit thread awakened (bnc#899908).\n- kgraft/gfs2: Do not block livepatching in the log daemon for too long.\n- kgraft/xen: Do not block livepatching in the XEN blkif kthread.\n- libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).\n- memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571).\n- mld, igmp: Fix reserved tailroom calculation (bsc#956852).\n- mmc: Allow forward compatibility for eMMC (bnc#966054).\n- mmc: sdhci: Allow for irq being shared (bnc#977582).\n- net/qlge: Avoids recursive EEH error (bsc#954847).\n- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).\n- net: Start with correct mac_len in skb_network_protocol (bsc#968667).\n- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).\n- net: fix wrong mac_len calculation for vlans (bsc#968667).\n- net: irda: Fix use-after-free in irtty_open() (bnc#967903).\n- nfs4: treat lock owners as opaque values (bnc#968141).\n- nfs: fix high load average due to callback thread sleeping (bsc#971170).\n- nfsd: fix nfsd_setattr return code for HSM (bsc#969992).\n- nvme: fix max_segments integer truncation (bsc#676471).\n- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).\n- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).\n- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).\n- perf, nmi: Fix unknown NMI warning (bsc#968512).\n- pipe: limit the per-user amount of pages allocated in pipes (bsc#970948).\n- rbd: do not log miscompare as an error (bsc#970062).\n- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).\n- rbd: report unsupported features to syslog (bsc#979169).\n- rbd: use GFP_NOIO consistently for request allocations (bsc#971159).\n- reduce m_start() cost.. (bsc#966573).\n- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.\n- s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413).\n- sched/x86: Fix up typo in topology detection (bsc#974165).\n- scsi: proper state checking and module refcount handling in scsi_device_get (boo#966831).\n- series.conf: move netfilter section at the end of core networking\n- supported.conf: Add bridge.ko for OpenStack (bsc#971600)\n- supported.conf: Add isofs to -base (bsc#969655).\n- supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461)\n- target/rbd: do not put snap_context twice (bsc#981143).\n- target/rbd: remove caw_mutex usage (bsc#981143).\n- target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872).\n- target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872).\n- target: Fix LUN_RESET active TMR descriptor handling (bsc#962872).\n- target: Fix TAS handling for multi-session se_node_acls (bsc#962872).\n- target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872).\n- target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872).\n- vgaarb: Add more context to error messages (bsc#976868).\n- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).\n- x86/efi: parse_efi_setup() build fix (bsc#979485).\n- x86: standardize mmap_rnd() usage (bnc#974308).\n- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).\n- xfs/dmapi: drop lock over synchronous XFS_SEND_DATA events (bsc#969993).\n- xfs/dmapi: propertly send postcreate event (bsc#967299).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-DESKTOP-12-2016-1001,SUSE-SLE-Live-Patching-12-2016-1001,SUSE-SLE-Module-Public-Cloud-12-2016-1001,SUSE-SLE-SDK-12-2016-1001,SUSE-SLE-SERVER-12-2016-1001,SUSE-SLE-WE-12-2016-1001", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1690-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:1690-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20161690-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:1690-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html", }, { category: "self", summary: "SUSE Bug 676471", url: "https://bugzilla.suse.com/676471", }, { category: "self", summary: "SUSE Bug 880007", url: "https://bugzilla.suse.com/880007", }, { category: "self", summary: "SUSE Bug 889207", url: "https://bugzilla.suse.com/889207", }, { category: "self", summary: "SUSE Bug 899908", url: "https://bugzilla.suse.com/899908", }, { category: "self", summary: "SUSE Bug 903279", url: "https://bugzilla.suse.com/903279", }, { category: "self", summary: "SUSE Bug 928547", url: "https://bugzilla.suse.com/928547", }, { category: "self", summary: "SUSE Bug 931448", url: "https://bugzilla.suse.com/931448", }, { category: "self", summary: "SUSE Bug 940413", url: "https://bugzilla.suse.com/940413", }, { category: "self", summary: "SUSE Bug 943989", url: "https://bugzilla.suse.com/943989", }, { category: "self", summary: "SUSE Bug 944309", url: "https://bugzilla.suse.com/944309", }, { category: "self", summary: "SUSE Bug 945345", url: "https://bugzilla.suse.com/945345", }, { category: "self", summary: "SUSE Bug 947337", url: "https://bugzilla.suse.com/947337", }, { category: "self", summary: "SUSE Bug 953233", url: "https://bugzilla.suse.com/953233", }, { category: "self", summary: "SUSE Bug 954847", url: "https://bugzilla.suse.com/954847", }, { category: "self", summary: "SUSE Bug 956491", url: "https://bugzilla.suse.com/956491", }, { category: "self", summary: "SUSE Bug 956852", url: "https://bugzilla.suse.com/956852", }, { category: "self", summary: "SUSE Bug 957805", url: "https://bugzilla.suse.com/957805", }, { category: "self", summary: "SUSE Bug 957986", url: "https://bugzilla.suse.com/957986", }, { category: "self", summary: "SUSE Bug 960857", url: "https://bugzilla.suse.com/960857", }, { category: "self", summary: "SUSE Bug 962336", url: "https://bugzilla.suse.com/962336", }, { category: "self", summary: "SUSE Bug 962846", url: "https://bugzilla.suse.com/962846", }, { category: "self", summary: "SUSE Bug 962872", url: "https://bugzilla.suse.com/962872", }, { category: "self", summary: "SUSE Bug 963193", url: "https://bugzilla.suse.com/963193", }, { category: "self", summary: "SUSE Bug 963572", url: "https://bugzilla.suse.com/963572", }, { category: "self", summary: "SUSE Bug 963762", url: "https://bugzilla.suse.com/963762", }, { category: "self", summary: "SUSE Bug 964461", url: "https://bugzilla.suse.com/964461", }, { category: "self", summary: "SUSE Bug 964727", url: "https://bugzilla.suse.com/964727", }, { category: "self", summary: "SUSE Bug 965319", url: "https://bugzilla.suse.com/965319", }, { category: "self", summary: "SUSE Bug 966054", url: "https://bugzilla.suse.com/966054", }, { category: "self", summary: "SUSE Bug 966245", url: "https://bugzilla.suse.com/966245", }, { category: "self", summary: "SUSE Bug 966573", url: "https://bugzilla.suse.com/966573", }, { category: "self", summary: "SUSE Bug 966831", url: "https://bugzilla.suse.com/966831", }, { category: "self", summary: "SUSE Bug 967251", url: "https://bugzilla.suse.com/967251", }, { category: "self", summary: "SUSE Bug 967292", url: "https://bugzilla.suse.com/967292", }, { category: "self", summary: "SUSE Bug 967299", url: "https://bugzilla.suse.com/967299", }, { category: "self", summary: "SUSE Bug 967903", url: "https://bugzilla.suse.com/967903", }, { category: "self", summary: "SUSE Bug 968010", url: "https://bugzilla.suse.com/968010", }, { category: "self", summary: "SUSE Bug 968141", url: "https://bugzilla.suse.com/968141", }, { category: "self", summary: "SUSE Bug 968448", url: "https://bugzilla.suse.com/968448", }, { category: "self", summary: "SUSE Bug 968512", url: "https://bugzilla.suse.com/968512", }, { category: "self", summary: "SUSE Bug 968667", url: "https://bugzilla.suse.com/968667", }, { category: "self", summary: "SUSE Bug 968670", url: "https://bugzilla.suse.com/968670", }, { category: "self", summary: "SUSE Bug 968687", url: "https://bugzilla.suse.com/968687", }, { category: "self", summary: "SUSE Bug 968812", url: "https://bugzilla.suse.com/968812", }, { category: "self", summary: "SUSE Bug 968813", url: "https://bugzilla.suse.com/968813", }, { category: "self", summary: "SUSE Bug 969439", url: "https://bugzilla.suse.com/969439", }, { category: "self", summary: "SUSE Bug 969571", url: "https://bugzilla.suse.com/969571", }, { category: "self", summary: "SUSE Bug 969655", url: "https://bugzilla.suse.com/969655", }, { category: "self", summary: "SUSE Bug 969690", url: "https://bugzilla.suse.com/969690", }, { category: "self", summary: "SUSE Bug 969735", url: "https://bugzilla.suse.com/969735", }, { category: "self", summary: "SUSE Bug 969992", url: "https://bugzilla.suse.com/969992", }, { category: "self", summary: "SUSE Bug 969993", url: "https://bugzilla.suse.com/969993", }, { category: "self", summary: "SUSE Bug 970062", url: "https://bugzilla.suse.com/970062", }, { category: "self", summary: "SUSE Bug 970114", url: "https://bugzilla.suse.com/970114", }, { category: "self", summary: "SUSE Bug 970504", url: "https://bugzilla.suse.com/970504", }, { category: "self", summary: "SUSE Bug 970506", url: "https://bugzilla.suse.com/970506", }, { category: "self", summary: "SUSE Bug 970604", url: "https://bugzilla.suse.com/970604", }, { category: "self", summary: "SUSE Bug 970892", url: "https://bugzilla.suse.com/970892", }, { category: "self", summary: "SUSE Bug 970909", url: "https://bugzilla.suse.com/970909", }, { category: "self", summary: "SUSE Bug 970911", url: "https://bugzilla.suse.com/970911", }, { category: "self", summary: "SUSE Bug 970948", url: "https://bugzilla.suse.com/970948", }, { category: "self", summary: "SUSE Bug 970955", url: "https://bugzilla.suse.com/970955", }, { category: "self", summary: "SUSE Bug 970956", url: "https://bugzilla.suse.com/970956", }, { category: "self", summary: "SUSE Bug 970958", url: "https://bugzilla.suse.com/970958", }, { category: "self", summary: "SUSE Bug 970970", url: "https://bugzilla.suse.com/970970", }, { category: "self", summary: "SUSE Bug 971049", url: "https://bugzilla.suse.com/971049", }, { category: "self", summary: "SUSE Bug 971124", url: "https://bugzilla.suse.com/971124", }, { category: "self", summary: "SUSE Bug 971125", url: "https://bugzilla.suse.com/971125", }, { category: "self", summary: "SUSE Bug 971126", url: "https://bugzilla.suse.com/971126", }, { category: "self", summary: "SUSE Bug 971159", url: "https://bugzilla.suse.com/971159", }, { category: "self", summary: "SUSE Bug 971170", url: "https://bugzilla.suse.com/971170", }, { category: "self", summary: "SUSE Bug 971360", url: "https://bugzilla.suse.com/971360", }, { category: "self", summary: "SUSE Bug 971600", url: "https://bugzilla.suse.com/971600", }, { category: "self", summary: "SUSE Bug 971628", url: "https://bugzilla.suse.com/971628", }, { category: "self", summary: "SUSE Bug 971947", url: "https://bugzilla.suse.com/971947", }, { category: "self", summary: "SUSE Bug 972003", url: "https://bugzilla.suse.com/972003", }, { category: "self", summary: "SUSE Bug 972174", url: "https://bugzilla.suse.com/972174", }, { category: "self", summary: "SUSE Bug 972844", url: "https://bugzilla.suse.com/972844", }, { category: "self", summary: "SUSE Bug 972891", url: "https://bugzilla.suse.com/972891", }, { category: "self", summary: "SUSE Bug 972933", url: "https://bugzilla.suse.com/972933", }, { category: "self", summary: "SUSE Bug 972951", url: "https://bugzilla.suse.com/972951", }, { category: "self", summary: "SUSE Bug 973378", url: "https://bugzilla.suse.com/973378", }, { category: "self", summary: "SUSE Bug 973556", url: "https://bugzilla.suse.com/973556", }, { category: "self", summary: "SUSE Bug 973570", url: "https://bugzilla.suse.com/973570", }, { category: "self", summary: "SUSE Bug 973855", url: "https://bugzilla.suse.com/973855", }, { category: "self", summary: "SUSE Bug 974165", url: "https://bugzilla.suse.com/974165", }, { category: "self", summary: "SUSE Bug 974308", url: "https://bugzilla.suse.com/974308", }, { category: "self", summary: "SUSE Bug 974406", url: "https://bugzilla.suse.com/974406", }, { category: "self", summary: "SUSE Bug 974418", url: "https://bugzilla.suse.com/974418", }, { category: "self", summary: "SUSE Bug 974646", url: "https://bugzilla.suse.com/974646", }, { category: "self", summary: "SUSE Bug 975371", url: "https://bugzilla.suse.com/975371", }, { category: "self", summary: "SUSE Bug 975488", url: "https://bugzilla.suse.com/975488", }, { category: "self", summary: "SUSE Bug 975533", url: "https://bugzilla.suse.com/975533", }, { category: "self", summary: "SUSE Bug 975945", url: "https://bugzilla.suse.com/975945", }, { category: "self", summary: "SUSE Bug 976739", url: "https://bugzilla.suse.com/976739", }, { category: "self", summary: "SUSE Bug 976868", url: "https://bugzilla.suse.com/976868", }, { category: "self", summary: "SUSE Bug 977582", url: "https://bugzilla.suse.com/977582", }, { category: "self", summary: "SUSE Bug 977685", url: "https://bugzilla.suse.com/977685", }, { category: "self", summary: "SUSE Bug 978401", url: "https://bugzilla.suse.com/978401", }, { category: "self", summary: "SUSE Bug 978822", url: "https://bugzilla.suse.com/978822", }, { category: "self", summary: "SUSE Bug 979169", url: "https://bugzilla.suse.com/979169", }, { category: "self", summary: "SUSE Bug 979213", url: "https://bugzilla.suse.com/979213", }, { category: "self", summary: "SUSE Bug 979419", url: "https://bugzilla.suse.com/979419", }, { category: "self", summary: "SUSE Bug 979485", url: "https://bugzilla.suse.com/979485", }, { category: "self", summary: "SUSE Bug 979548", url: "https://bugzilla.suse.com/979548", }, { category: "self", summary: "SUSE Bug 979867", url: "https://bugzilla.suse.com/979867", }, { category: "self", summary: "SUSE Bug 979879", url: "https://bugzilla.suse.com/979879", }, { category: "self", summary: "SUSE Bug 980348", url: "https://bugzilla.suse.com/980348", }, { category: "self", summary: "SUSE Bug 980371", url: "https://bugzilla.suse.com/980371", }, { category: "self", summary: "SUSE Bug 981143", url: "https://bugzilla.suse.com/981143", }, { category: "self", summary: "SUSE Bug 981344", url: "https://bugzilla.suse.com/981344", }, { category: "self", summary: "SUSE Bug 982354", url: "https://bugzilla.suse.com/982354", }, { category: "self", summary: "SUSE Bug 982698", url: "https://bugzilla.suse.com/982698", }, { category: "self", summary: "SUSE Bug 983213", url: "https://bugzilla.suse.com/983213", }, { category: "self", summary: "SUSE Bug 983318", url: "https://bugzilla.suse.com/983318", }, { category: "self", summary: "SUSE Bug 983394", url: "https://bugzilla.suse.com/983394", }, { category: "self", summary: "SUSE Bug 983904", url: "https://bugzilla.suse.com/983904", }, { category: "self", summary: "SUSE Bug 984456", url: "https://bugzilla.suse.com/984456", }, { category: "self", summary: "SUSE CVE CVE-2014-9717 page", url: "https://www.suse.com/security/cve/CVE-2014-9717/", }, { category: "self", summary: "SUSE CVE CVE-2015-8816 page", url: "https://www.suse.com/security/cve/CVE-2015-8816/", }, { category: "self", summary: "SUSE CVE CVE-2015-8845 page", url: "https://www.suse.com/security/cve/CVE-2015-8845/", }, { category: "self", summary: "SUSE CVE CVE-2016-0758 page", url: "https://www.suse.com/security/cve/CVE-2016-0758/", }, { category: "self", summary: "SUSE CVE CVE-2016-2053 page", url: "https://www.suse.com/security/cve/CVE-2016-2053/", }, { category: "self", summary: "SUSE CVE CVE-2016-2143 page", url: "https://www.suse.com/security/cve/CVE-2016-2143/", }, { category: "self", summary: "SUSE CVE CVE-2016-2184 page", url: "https://www.suse.com/security/cve/CVE-2016-2184/", }, { category: "self", summary: "SUSE CVE CVE-2016-2185 page", url: "https://www.suse.com/security/cve/CVE-2016-2185/", }, { category: "self", summary: "SUSE CVE CVE-2016-2186 page", url: "https://www.suse.com/security/cve/CVE-2016-2186/", }, { category: "self", summary: "SUSE CVE CVE-2016-2188 page", url: "https://www.suse.com/security/cve/CVE-2016-2188/", }, { category: "self", summary: "SUSE CVE CVE-2016-2782 page", url: "https://www.suse.com/security/cve/CVE-2016-2782/", }, { category: "self", summary: "SUSE CVE CVE-2016-2847 page", url: "https://www.suse.com/security/cve/CVE-2016-2847/", }, { category: "self", summary: "SUSE CVE CVE-2016-3134 page", url: "https://www.suse.com/security/cve/CVE-2016-3134/", }, { category: "self", summary: "SUSE CVE CVE-2016-3136 page", url: "https://www.suse.com/security/cve/CVE-2016-3136/", }, { category: "self", summary: "SUSE CVE CVE-2016-3137 page", url: "https://www.suse.com/security/cve/CVE-2016-3137/", }, { category: "self", summary: "SUSE CVE CVE-2016-3138 page", url: "https://www.suse.com/security/cve/CVE-2016-3138/", }, { category: "self", summary: "SUSE CVE CVE-2016-3139 page", url: "https://www.suse.com/security/cve/CVE-2016-3139/", }, { category: "self", summary: "SUSE CVE CVE-2016-3140 page", url: "https://www.suse.com/security/cve/CVE-2016-3140/", }, { category: "self", summary: "SUSE CVE CVE-2016-3156 page", url: "https://www.suse.com/security/cve/CVE-2016-3156/", }, { category: "self", summary: "SUSE CVE CVE-2016-3672 page", url: "https://www.suse.com/security/cve/CVE-2016-3672/", }, { category: "self", summary: "SUSE CVE CVE-2016-3689 page", url: "https://www.suse.com/security/cve/CVE-2016-3689/", }, { category: "self", summary: "SUSE CVE CVE-2016-3951 page", url: "https://www.suse.com/security/cve/CVE-2016-3951/", }, { category: "self", summary: "SUSE CVE CVE-2016-4482 page", url: "https://www.suse.com/security/cve/CVE-2016-4482/", }, { category: "self", summary: "SUSE CVE CVE-2016-4486 page", url: "https://www.suse.com/security/cve/CVE-2016-4486/", }, { category: "self", summary: "SUSE CVE CVE-2016-4565 page", url: "https://www.suse.com/security/cve/CVE-2016-4565/", }, { category: "self", summary: "SUSE CVE CVE-2016-4569 page", url: "https://www.suse.com/security/cve/CVE-2016-4569/", }, { category: "self", summary: "SUSE CVE CVE-2016-4578 page", url: "https://www.suse.com/security/cve/CVE-2016-4578/", }, { category: "self", summary: "SUSE CVE CVE-2016-4805 page", url: "https://www.suse.com/security/cve/CVE-2016-4805/", }, { category: "self", summary: "SUSE CVE CVE-2016-5244 page", url: "https://www.suse.com/security/cve/CVE-2016-5244/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2016-06-27T13:27:05Z", generator: { date: "2016-06-27T13:27:05Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:1690-1", initial_release_date: "2016-06-27T13:27:05Z", revision_history: [ { date: "2016-06-27T13:27:05Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-3.12.60-52.49.1.noarch", product: { name: "kernel-devel-3.12.60-52.49.1.noarch", product_id: "kernel-devel-3.12.60-52.49.1.noarch", }, }, { category: "product_version", name: "kernel-macros-3.12.60-52.49.1.noarch", product: { name: "kernel-macros-3.12.60-52.49.1.noarch", product_id: "kernel-macros-3.12.60-52.49.1.noarch", }, }, { category: "product_version", name: "kernel-source-3.12.60-52.49.1.noarch", product: { name: "kernel-source-3.12.60-52.49.1.noarch", product_id: "kernel-source-3.12.60-52.49.1.noarch", }, }, { category: "product_version", name: "kernel-docs-3.12.60-52.49.3.noarch", product: { name: "kernel-docs-3.12.60-52.49.3.noarch", product_id: "kernel-docs-3.12.60-52.49.3.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-obs-build-3.12.60-52.49.1.ppc64le", product: { name: "kernel-obs-build-3.12.60-52.49.1.ppc64le", product_id: "kernel-obs-build-3.12.60-52.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-3.12.60-52.49.1.ppc64le", product: { name: "kernel-default-3.12.60-52.49.1.ppc64le", product_id: "kernel-default-3.12.60-52.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-3.12.60-52.49.1.ppc64le", product: { name: "kernel-default-base-3.12.60-52.49.1.ppc64le", product_id: "kernel-default-base-3.12.60-52.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-3.12.60-52.49.1.ppc64le", product: { name: "kernel-default-devel-3.12.60-52.49.1.ppc64le", product_id: "kernel-default-devel-3.12.60-52.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-3.12.60-52.49.1.ppc64le", product: { name: "kernel-syms-3.12.60-52.49.1.ppc64le", product_id: "kernel-syms-3.12.60-52.49.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-obs-build-3.12.60-52.49.1.s390x", product: { name: "kernel-obs-build-3.12.60-52.49.1.s390x", product_id: "kernel-obs-build-3.12.60-52.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-3.12.60-52.49.1.s390x", product: { name: "kernel-default-3.12.60-52.49.1.s390x", product_id: "kernel-default-3.12.60-52.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.12.60-52.49.1.s390x", product: { name: "kernel-default-base-3.12.60-52.49.1.s390x", product_id: "kernel-default-base-3.12.60-52.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.12.60-52.49.1.s390x", product: { name: "kernel-default-devel-3.12.60-52.49.1.s390x", product_id: "kernel-default-devel-3.12.60-52.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.12.60-52.49.1.s390x", product: { name: "kernel-default-man-3.12.60-52.49.1.s390x", product_id: "kernel-default-man-3.12.60-52.49.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.12.60-52.49.1.s390x", product: { name: "kernel-syms-3.12.60-52.49.1.s390x", product_id: "kernel-syms-3.12.60-52.49.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-3.12.60-52.49.1.x86_64", product: { name: "kernel-default-3.12.60-52.49.1.x86_64", product_id: "kernel-default-3.12.60-52.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.12.60-52.49.1.x86_64", product: { name: "kernel-default-devel-3.12.60-52.49.1.x86_64", product_id: "kernel-default-devel-3.12.60-52.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-3.12.60-52.49.1.x86_64", product: { name: "kernel-default-extra-3.12.60-52.49.1.x86_64", product_id: "kernel-default-extra-3.12.60-52.49.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.12.60-52.49.1.x86_64", product: { name: "kernel-syms-3.12.60-52.49.1.x86_64", product_id: "kernel-syms-3.12.60-52.49.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.12.60-52.49.1.x86_64", product: { name: "kernel-xen-3.12.60-52.49.1.x86_64", product_id: "kernel-xen-3.12.60-52.49.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.12.60-52.49.1.x86_64", product: { name: "kernel-xen-devel-3.12.60-52.49.1.x86_64", product_id: "kernel-xen-devel-3.12.60-52.49.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", product: { name: "kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", product_id: "kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", product: { name: "kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", product_id: "kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-3.12.60-52.49.1.x86_64", product: { name: "kernel-ec2-3.12.60-52.49.1.x86_64", product_id: "kernel-ec2-3.12.60-52.49.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.12.60-52.49.1.x86_64", product: { name: "kernel-ec2-devel-3.12.60-52.49.1.x86_64", product_id: "kernel-ec2-devel-3.12.60-52.49.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-extra-3.12.60-52.49.1.x86_64", product: { name: "kernel-ec2-extra-3.12.60-52.49.1.x86_64", product_id: "kernel-ec2-extra-3.12.60-52.49.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-3.12.60-52.49.1.x86_64", product: { name: "kernel-obs-build-3.12.60-52.49.1.x86_64", product_id: "kernel-obs-build-3.12.60-52.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.12.60-52.49.1.x86_64", product: { name: "kernel-default-base-3.12.60-52.49.1.x86_64", product_id: "kernel-default-base-3.12.60-52.49.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.12.60-52.49.1.x86_64", product: { name: "kernel-xen-base-3.12.60-52.49.1.x86_64", product_id: "kernel-xen-base-3.12.60-52.49.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12", product: { name: "SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12", product_identification_helper: { cpe: "cpe:/o:suse:sled:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12", product: { name: "SUSE Linux Enterprise Live Patching 12", product_id: "SUSE Linux Enterprise Live Patching 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 12", product: { name: "SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12", product: { name: "SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12", product: { name: "SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12", product_identification_helper: { cpe: "cpe:/o:suse:sles:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12", product: { name: "SUSE Linux Enterprise Workstation Extension 12", product_id: "SUSE Linux Enterprise Workstation Extension 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-default-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-default-devel-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-default-extra-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.60-52.49.1.noarch as component of SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", }, product_reference: "kernel-devel-3.12.60-52.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.60-52.49.1.noarch as component of SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", }, product_reference: "kernel-macros-3.12.60-52.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.60-52.49.1.noarch as component of SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", }, product_reference: "kernel-source-3.12.60-52.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-syms-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-xen-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", product_id: "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", }, product_reference: "kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", product_id: "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", }, product_reference: "kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-ec2-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-ec2-devel-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-extra-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-ec2-extra-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-3.12.60-52.49.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", }, product_reference: "kernel-docs-3.12.60-52.49.3.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-3.12.60-52.49.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", }, product_reference: "kernel-obs-build-3.12.60-52.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-3.12.60-52.49.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", }, product_reference: "kernel-obs-build-3.12.60-52.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-obs-build-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.60-52.49.1.ppc64le as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", }, product_reference: "kernel-default-3.12.60-52.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.60-52.49.1.s390x as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", }, product_reference: "kernel-default-3.12.60-52.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-default-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.60-52.49.1.ppc64le as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", }, product_reference: "kernel-default-base-3.12.60-52.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.60-52.49.1.s390x as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", }, product_reference: "kernel-default-base-3.12.60-52.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-default-base-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.60-52.49.1.ppc64le as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", }, product_reference: "kernel-default-devel-3.12.60-52.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.60-52.49.1.s390x as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", }, product_reference: "kernel-default-devel-3.12.60-52.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-default-devel-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.12.60-52.49.1.s390x as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", }, product_reference: "kernel-default-man-3.12.60-52.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.60-52.49.1.noarch as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", }, product_reference: "kernel-devel-3.12.60-52.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.60-52.49.1.noarch as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", }, product_reference: "kernel-macros-3.12.60-52.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.60-52.49.1.noarch as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", }, product_reference: "kernel-source-3.12.60-52.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.60-52.49.1.ppc64le as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", }, product_reference: "kernel-syms-3.12.60-52.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.60-52.49.1.s390x as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", }, product_reference: "kernel-syms-3.12.60-52.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-syms-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-xen-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-xen-base-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server 12", product_id: "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.60-52.49.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", }, product_reference: "kernel-default-3.12.60-52.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.60-52.49.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", }, product_reference: "kernel-default-3.12.60-52.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-default-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.60-52.49.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", }, product_reference: "kernel-default-base-3.12.60-52.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.60-52.49.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", }, product_reference: "kernel-default-base-3.12.60-52.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-default-base-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.60-52.49.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", }, product_reference: "kernel-default-devel-3.12.60-52.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.60-52.49.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", }, product_reference: "kernel-default-devel-3.12.60-52.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-default-devel-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.12.60-52.49.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", }, product_reference: "kernel-default-man-3.12.60-52.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.60-52.49.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", }, product_reference: "kernel-devel-3.12.60-52.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.60-52.49.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", }, product_reference: "kernel-macros-3.12.60-52.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.60-52.49.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", }, product_reference: "kernel-source-3.12.60-52.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.60-52.49.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", }, product_reference: "kernel-syms-3.12.60-52.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.60-52.49.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", }, product_reference: "kernel-syms-3.12.60-52.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-syms-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-xen-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-xen-base-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-3.12.60-52.49.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12", product_id: "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", }, product_reference: "kernel-default-extra-3.12.60-52.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12", }, ], }, vulnerabilities: [ { cve: "CVE-2014-9717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9717", }, ], notes: [ { category: "general", text: "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9717", url: "https://www.suse.com/security/cve/CVE-2014-9717", }, { category: "external", summary: "SUSE Bug 928547 for CVE-2014-9717", url: "https://bugzilla.suse.com/928547", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "low", }, ], title: "CVE-2014-9717", }, { cve: "CVE-2015-8816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8816", }, ], notes: [ { category: "general", text: "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8816", url: "https://www.suse.com/security/cve/CVE-2015-8816", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2015-8816", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 968010 for CVE-2015-8816", url: "https://bugzilla.suse.com/968010", }, { category: "external", summary: "SUSE Bug 979064 for CVE-2015-8816", url: "https://bugzilla.suse.com/979064", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2015-8816", }, { cve: "CVE-2015-8845", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8845", }, ], notes: [ { category: "general", text: "The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8845", url: "https://www.suse.com/security/cve/CVE-2015-8845", }, { category: "external", summary: "SUSE Bug 975531 for CVE-2015-8845", url: "https://bugzilla.suse.com/975531", }, { category: "external", summary: "SUSE Bug 975533 for CVE-2015-8845", url: "https://bugzilla.suse.com/975533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2015-8845", }, { cve: "CVE-2016-0758", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0758", }, ], notes: [ { category: "general", text: "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0758", url: "https://www.suse.com/security/cve/CVE-2016-0758", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-0758", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1072204 for CVE-2016-0758", url: "https://bugzilla.suse.com/1072204", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-0758", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 979867 for CVE-2016-0758", url: "https://bugzilla.suse.com/979867", }, { category: "external", summary: "SUSE Bug 980856 for CVE-2016-0758", url: "https://bugzilla.suse.com/980856", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "important", }, ], title: "CVE-2016-0758", }, { cve: "CVE-2016-2053", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2053", }, ], notes: [ { category: "general", text: "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2053", url: "https://www.suse.com/security/cve/CVE-2016-2053", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2053", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 963762 for CVE-2016-2053", url: "https://bugzilla.suse.com/963762", }, { category: "external", summary: "SUSE Bug 979074 for CVE-2016-2053", url: "https://bugzilla.suse.com/979074", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-2053", }, { cve: "CVE-2016-2143", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2143", }, ], notes: [ { category: "general", text: "The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2143", url: "https://www.suse.com/security/cve/CVE-2016-2143", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-2143", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 970504 for CVE-2016-2143", url: "https://bugzilla.suse.com/970504", }, { category: "external", summary: "SUSE Bug 993872 for CVE-2016-2143", url: "https://bugzilla.suse.com/993872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "important", }, ], title: "CVE-2016-2143", }, { cve: "CVE-2016-2184", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2184", }, ], notes: [ { category: "general", text: "The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2184", url: "https://www.suse.com/security/cve/CVE-2016-2184", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2184", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 971125 for CVE-2016-2184", url: "https://bugzilla.suse.com/971125", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-2184", }, { cve: "CVE-2016-2185", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2185", }, ], notes: [ { category: "general", text: "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2185", url: "https://www.suse.com/security/cve/CVE-2016-2185", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2185", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 971124 for CVE-2016-2185", url: "https://bugzilla.suse.com/971124", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-2185", }, { cve: "CVE-2016-2186", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2186", }, ], notes: [ { category: "general", text: "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2186", url: "https://www.suse.com/security/cve/CVE-2016-2186", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2186", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970958 for CVE-2016-2186", url: "https://bugzilla.suse.com/970958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-2186", }, { cve: "CVE-2016-2188", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2188", }, ], notes: [ { category: "general", text: "The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2188", url: "https://www.suse.com/security/cve/CVE-2016-2188", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2188", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1067912 for CVE-2016-2188", url: "https://bugzilla.suse.com/1067912", }, { category: "external", summary: "SUSE Bug 1132190 for CVE-2016-2188", url: "https://bugzilla.suse.com/1132190", }, { category: "external", summary: "SUSE Bug 970956 for CVE-2016-2188", url: "https://bugzilla.suse.com/970956", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-2188", }, { cve: "CVE-2016-2782", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2782", }, ], notes: [ { category: "general", text: "The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2782", url: "https://www.suse.com/security/cve/CVE-2016-2782", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2782", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 961512 for CVE-2016-2782", url: "https://bugzilla.suse.com/961512", }, { category: "external", summary: "SUSE Bug 968670 for CVE-2016-2782", url: "https://bugzilla.suse.com/968670", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "low", }, ], title: "CVE-2016-2782", }, { cve: "CVE-2016-2847", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2847", }, ], notes: [ { category: "general", text: "fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2847", url: "https://www.suse.com/security/cve/CVE-2016-2847", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2847", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970948 for CVE-2016-2847", url: "https://bugzilla.suse.com/970948", }, { category: "external", summary: "SUSE Bug 974646 for CVE-2016-2847", url: "https://bugzilla.suse.com/974646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-2847", }, { cve: "CVE-2016-3134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3134", }, ], notes: [ { category: "general", text: "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3134", url: "https://www.suse.com/security/cve/CVE-2016-3134", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-3134", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-3134", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-3134", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 971126 for CVE-2016-3134", url: "https://bugzilla.suse.com/971126", }, { category: "external", summary: "SUSE Bug 971793 for CVE-2016-3134", url: "https://bugzilla.suse.com/971793", }, { category: "external", summary: "SUSE Bug 986362 for CVE-2016-3134", url: "https://bugzilla.suse.com/986362", }, { category: "external", summary: "SUSE Bug 986365 for CVE-2016-3134", url: "https://bugzilla.suse.com/986365", }, { category: "external", summary: "SUSE Bug 986377 for CVE-2016-3134", url: "https://bugzilla.suse.com/986377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-3134", }, { cve: "CVE-2016-3136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3136", }, ], notes: [ { category: "general", text: "The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3136", url: "https://www.suse.com/security/cve/CVE-2016-3136", }, { category: "external", summary: "SUSE Bug 970955 for CVE-2016-3136", url: "https://bugzilla.suse.com/970955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-3136", }, { cve: "CVE-2016-3137", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3137", }, ], notes: [ { category: "general", text: "drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3137", url: "https://www.suse.com/security/cve/CVE-2016-3137", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-3137", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970970 for CVE-2016-3137", url: "https://bugzilla.suse.com/970970", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-3137", }, { cve: "CVE-2016-3138", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3138", }, ], notes: [ { category: "general", text: "The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3138", url: "https://www.suse.com/security/cve/CVE-2016-3138", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-3138", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970911 for CVE-2016-3138", url: "https://bugzilla.suse.com/970911", }, { category: "external", summary: "SUSE Bug 970970 for CVE-2016-3138", url: "https://bugzilla.suse.com/970970", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-3138", }, { cve: "CVE-2016-3139", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3139", }, ], notes: [ { category: "general", text: "The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel before 3.17 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3139", url: "https://www.suse.com/security/cve/CVE-2016-3139", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-3139", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970909 for CVE-2016-3139", url: "https://bugzilla.suse.com/970909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-3139", }, { cve: "CVE-2016-3140", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3140", }, ], notes: [ { category: "general", text: "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3140", url: "https://www.suse.com/security/cve/CVE-2016-3140", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-3140", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 970892 for CVE-2016-3140", url: "https://bugzilla.suse.com/970892", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-3140", }, { cve: "CVE-2016-3156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3156", }, ], notes: [ { category: "general", text: "The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3156", url: "https://www.suse.com/security/cve/CVE-2016-3156", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-3156", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 971360 for CVE-2016-3156", url: "https://bugzilla.suse.com/971360", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "low", }, ], title: "CVE-2016-3156", }, { cve: "CVE-2016-3672", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3672", }, ], notes: [ { category: "general", text: "The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3672", url: "https://www.suse.com/security/cve/CVE-2016-3672", }, { category: "external", summary: "SUSE Bug 974308 for CVE-2016-3672", url: "https://bugzilla.suse.com/974308", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "low", }, ], title: "CVE-2016-3672", }, { cve: "CVE-2016-3689", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3689", }, ], notes: [ { category: "general", text: "The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3689", url: "https://www.suse.com/security/cve/CVE-2016-3689", }, { category: "external", summary: "SUSE Bug 971628 for CVE-2016-3689", url: "https://bugzilla.suse.com/971628", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-3689", }, { cve: "CVE-2016-3951", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3951", }, ], notes: [ { category: "general", text: "Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3951", url: "https://www.suse.com/security/cve/CVE-2016-3951", }, { category: "external", summary: "SUSE Bug 974418 for CVE-2016-3951", url: "https://bugzilla.suse.com/974418", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-3951", }, { cve: "CVE-2016-4482", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4482", }, ], notes: [ { category: "general", text: "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4482", url: "https://www.suse.com/security/cve/CVE-2016-4482", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4482", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 978401 for CVE-2016-4482", url: "https://bugzilla.suse.com/978401", }, { category: "external", summary: "SUSE Bug 978445 for CVE-2016-4482", url: "https://bugzilla.suse.com/978445", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "low", }, ], title: "CVE-2016-4482", }, { cve: "CVE-2016-4486", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4486", }, ], notes: [ { category: "general", text: "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4486", url: "https://www.suse.com/security/cve/CVE-2016-4486", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4486", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 978822 for CVE-2016-4486", url: "https://bugzilla.suse.com/978822", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "low", }, ], title: "CVE-2016-4486", }, { cve: "CVE-2016-4565", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4565", }, ], notes: [ { category: "general", text: "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4565", url: "https://www.suse.com/security/cve/CVE-2016-4565", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4565", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 979548 for CVE-2016-4565", url: "https://bugzilla.suse.com/979548", }, { category: "external", summary: "SUSE Bug 980363 for CVE-2016-4565", url: "https://bugzilla.suse.com/980363", }, { category: "external", summary: "SUSE Bug 980883 for CVE-2016-4565", url: "https://bugzilla.suse.com/980883", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-4565", }, { cve: "CVE-2016-4569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4569", }, ], notes: [ { category: "general", text: "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4569", url: "https://www.suse.com/security/cve/CVE-2016-4569", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4569", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 979213 for CVE-2016-4569", url: "https://bugzilla.suse.com/979213", }, { category: "external", summary: "SUSE Bug 979879 for CVE-2016-4569", url: "https://bugzilla.suse.com/979879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "low", }, ], title: "CVE-2016-4569", }, { cve: "CVE-2016-4578", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4578", }, ], notes: [ { category: "general", text: "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4578", url: "https://www.suse.com/security/cve/CVE-2016-4578", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4578", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-4578", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 979879 for CVE-2016-4578", url: "https://bugzilla.suse.com/979879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "low", }, ], title: "CVE-2016-4578", }, { cve: "CVE-2016-4805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4805", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4805", url: "https://www.suse.com/security/cve/CVE-2016-4805", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4805", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-4805", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 980371 for CVE-2016-4805", url: "https://bugzilla.suse.com/980371", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "low", }, ], title: "CVE-2016-4805", }, { cve: "CVE-2016-5244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5244", }, ], notes: [ { category: "general", text: "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5244", url: "https://www.suse.com/security/cve/CVE-2016-5244", }, { category: "external", summary: "SUSE Bug 983213 for CVE-2016-5244", url: "https://bugzilla.suse.com/983213", }, { category: "external", summary: "SUSE Bug 986225 for CVE-2016-5244", url: "https://bugzilla.suse.com/986225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_49-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.49.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.49.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-27T13:27:05Z", details: "moderate", }, ], title: "CVE-2016-5244", }, ], }
gsd-2014-9717
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.
Aliases
Aliases
{ GSD: { alias: "CVE-2014-9717", description: "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", id: "GSD-2014-9717", references: [ "https://www.suse.com/security/cve/CVE-2014-9717.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2014-9717", ], details: "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", id: "GSD-2014-9717", modified: "2023-12-13T01:22:48.815889Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-9717", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2016:1690", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html", }, { name: "SUSE-SU-2016:1696", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html", }, { name: "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", refsource: "CONFIRM", url: "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { name: "[oss-security] 20150417 USERNS allows circumventing MNT_LOCKED", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/04/17/4", }, { name: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1", refsource: "CONFIRM", url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1226751", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1226751", }, { name: "[linux-kernel] 20141007 [PATCH] mnt: don't allow to detach the namespace root", refsource: "MLIST", url: "https://groups.google.com/forum/message/raw?msg=linux.kernel/HnegnbXk0Vs/RClojwJzAFEJ", }, { name: "[containers] 20150402 [PATCH review 0/19] Locked mount and loopback mount fixes", refsource: "MLIST", url: "http://www.spinics.net/lists/linux-containers/msg30786.html", }, { name: "74226", refsource: "BID", url: "http://www.securityfocus.com/bid/74226", }, { name: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2", refsource: "CONFIRM", url: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2", }, { name: "SUSE-SU-2016:1937", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "4.0.1", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-9717", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-284", }, ], }, ], }, references: { reference_data: [ { name: "[linux-kernel] 20141007 [PATCH] mnt: don't allow to detach the namespace root", refsource: "MLIST", tags: [], url: "https://groups.google.com/forum/message/raw?msg=linux.kernel/HnegnbXk0Vs/RClojwJzAFEJ", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1226751", refsource: "CONFIRM", tags: [], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1226751", }, { name: "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", refsource: "CONFIRM", tags: [ "Vendor Advisory", ], url: "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { name: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2", refsource: "CONFIRM", tags: [], url: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2", }, { name: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1", refsource: "CONFIRM", tags: [ "Vendor Advisory", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { name: "[oss-security] 20150417 USERNS allows circumventing MNT_LOCKED", refsource: "MLIST", tags: [], url: "http://www.openwall.com/lists/oss-security/2015/04/17/4", }, { name: "[containers] 20150402 [PATCH review 0/19] Locked mount and loopback mount fixes", refsource: "MLIST", tags: [], url: "http://www.spinics.net/lists/linux-containers/msg30786.html", }, { name: "74226", refsource: "BID", tags: [], url: "http://www.securityfocus.com/bid/74226", }, { name: "SUSE-SU-2016:1696", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html", }, { name: "SUSE-SU-2016:1690", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html", }, { name: "SUSE-SU-2016:1937", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 3.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 4.2, }, }, lastModifiedDate: "2016-08-12T01:59Z", publishedDate: "2016-05-02T10:59Z", }, }, }
fkie_cve-2014-9717
Vulnerability from fkie_nvd
Published
2016-05-02 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "D460F925-66B4-4BED-BD3B-91A8C60B8AC4", versionEndIncluding: "4.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", }, { lang: "es", value: "fs/namespace.c en el kernel de Linux en versiones anteriores a 4.0.2 procesa llamadas de sistema MNT_DETACH umount2 sin verificar que el indicador MNT_LOCKED no está establecido, lo que permite a usuarios locales eludir restricciones dedicadas al acceso y navegar a localizaciones de archivos de sistema bajo un montaje llamando a umount2 en un espacio de nombres de usuario.", }, ], id: "CVE-2014-9717", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 3.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 4.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-05-02T10:59:06.593", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html", }, { source: "cve@mitre.org", url: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2", }, { source: "cve@mitre.org", url: "http://www.openwall.com/lists/oss-security/2015/04/17/4", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/74226", }, { source: "cve@mitre.org", url: "http://www.spinics.net/lists/linux-containers/msg30786.html", }, { source: "cve@mitre.org", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1226751", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { source: "cve@mitre.org", url: "https://groups.google.com/forum/message/raw?msg=linux.kernel/HnegnbXk0Vs/RClojwJzAFEJ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2015/04/17/4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/74226", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.spinics.net/lists/linux-containers/msg30786.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1226751", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://groups.google.com/forum/message/raw?msg=linux.kernel/HnegnbXk0Vs/RClojwJzAFEJ", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ghsa-325x-3w5r-2xgh
Vulnerability from github
Published
2022-05-17 03:50
Modified
2022-05-17 03:50
Severity ?
Details
fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.
{ affected: [], aliases: [ "CVE-2014-9717", ], database_specific: { cwe_ids: [ "CWE-284", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2016-05-02T10:59:00Z", severity: "MODERATE", }, details: "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", id: "GHSA-325x-3w5r-2xgh", modified: "2022-05-17T03:50:32Z", published: "2022-05-17T03:50:32Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-9717", }, { type: "WEB", url: "https://github.com/torvalds/linux/commit/ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1226751", }, { type: "WEB", url: "https://groups.google.com/forum/message/raw?msg=linux.kernel/HnegnbXk0Vs/RClojwJzAFEJ", }, { type: "WEB", url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html", }, { type: "WEB", url: "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.2", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2015/04/17/4", }, { type: "WEB", url: "http://www.securityfocus.com/bid/74226", }, { type: "WEB", url: "http://www.spinics.net/lists/linux-containers/msg30786.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.