Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-10044 (GCVE-0-2016-10044)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:07:32.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7" }, { "name": "1037798", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037798" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://source.android.com/security/bulletin/2017-02-01.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "name": "96122", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96122" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2016-10044", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T13:08:15.380102Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T13:14:17.686Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-24T12:57:01", "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "shortName": "google_android" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7" }, { "name": "1037798", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037798" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://source.android.com/security/bulletin/2017-02-01.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "name": "96122", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96122" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2016-10044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7" }, { "name": "1037798", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037798" }, { "name": "http://source.android.com/security/bulletin/2017-02-01.html", "refsource": "CONFIRM", "url": "http://source.android.com/security/bulletin/2017-02-01.html" }, { "name": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "name": "96122", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96122" } ] } } } }, "cveMetadata": { "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "assignerShortName": "google_android", "cveId": "CVE-2016-10044", "datePublished": "2017-02-07T07:02:00", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-10-21T13:14:17.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-10044\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2017-02-07T07:59:00.293\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n aio_mount en fs/aio.c en el kernel de Linux en versiones anteriores a 4.7.7 no restringe adecuadamente el acceso de ejecuci\u00f3n, lo que facilita a usuarios locales eludir restricciones de pol\u00edtica destinadas SELinux W^X, y consecuentemente obtener privilegios, a trav\u00e9s de una llamada de sistema io_setup.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.16.43\",\"matchCriteriaId\":\"EE61EB40-EE9C-41E8-AC78-D38441DB9CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"4.4.24\",\"matchCriteriaId\":\"21856BF4-4072-4055-BA57-93D5C4608C07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.7.7\",\"matchCriteriaId\":\"004A2488-AD73-4B53-961A-EEA808A5183D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.1.1\",\"matchCriteriaId\":\"0F11609D-D1B4-4DD6-8CC7-A224344E1E67\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\",\"source\":\"security@android.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://source.android.com/security/bulletin/2017-02-01.html\",\"source\":\"security@android.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\",\"source\":\"security@android.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/96122\",\"source\":\"security@android.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037798\",\"source\":\"security@android.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\",\"source\":\"security@android.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://source.android.com/security/bulletin/2017-02-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/96122\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037798\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1037798\", \"name\": \"1037798\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}, {\"url\": \"http://source.android.com/security/bulletin/2017-02-01.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/96122\", \"name\": \"96122\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T03:07:32.042Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2016-10044\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-21T13:08:15.380102Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-21T13:08:18.505Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2016-04-27T00:00:00\", \"references\": [{\"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securitytracker.com/id/1037798\", \"name\": \"1037798\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}, {\"url\": \"http://source.android.com/security/bulletin/2017-02-01.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/96122\", \"name\": \"96122\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6\", \"shortName\": \"google_android\", \"dateUpdated\": \"2017-07-24T12:57:01\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"n/a\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\", \"name\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securitytracker.com/id/1037798\", \"name\": \"1037798\", \"refsource\": \"SECTRACK\"}, {\"url\": \"http://source.android.com/security/bulletin/2017-02-01.html\", \"name\": \"http://source.android.com/security/bulletin/2017-02-01.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"name\": \"https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"name\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securityfocus.com/bid/96122\", \"name\": \"96122\", \"refsource\": \"BID\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2016-10044\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"security@android.com\"}}}}", "cveMetadata": "{\"cveId\": \"CVE-2016-10044\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-21T13:14:17.686Z\", \"dateReserved\": \"2016-12-26T00:00:00\", \"assignerOrgId\": \"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6\", \"datePublished\": \"2017-02-07T07:02:00\", \"assignerShortName\": \"google_android\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
WID-SEC-W-2024-3251
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder andere, nicht n\u00e4her bekannte Auswirkungen zu erzielen..", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3251 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3251.json" }, { "category": "self", "summary": "WID-SEC-2024-3251 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3251" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47726", "url": "https://lore.kernel.org/linux-cve-announce/2024102104-CVE-2024-47726-ae53@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47729", "url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47729-8985@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47730", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47730-2f1e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47731", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47731-fd73@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47732", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47732-f8aa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50003", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-50003-43bc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47733", "url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47733-6591@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47734", "url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47734-ad75@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47735", "url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47735-5d51@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50004", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50004-101e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50005", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50005-3479@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50006", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50006-fe44@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50007", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50007-0253@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50008", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50008-0152@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50009", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50009-1b62@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50010", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50010-57e8@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50011", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50011-98c9@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50012", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50012-db7d@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49863", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-49863-6a74@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50013", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50013-05ef@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50014", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50014-d684@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50015", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50015-1eb0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50016", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50016-745a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50017", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50017-f157@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50018", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-50018-65e9@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47749", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47749-c227@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47750", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47750-390b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47751", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47751-7a96@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47752", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47752-1b11@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49864", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49864-5158@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49865", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49865-ae89@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49866", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49866-159b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49867", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49867-b47a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49868", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49868-8dce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47753", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47753-45cf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47754", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47754-a412@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49869", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49869-f804@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49870", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49870-44f0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49871", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49871-1293@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49872", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49872-16d4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49873", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49873-3190@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47755", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47755-2cb3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47756", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47756-1c60@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47757", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47757-2b1e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49874", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49874-6deb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49876", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49876-7fe2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49877", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49877-038a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49885", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49885-d5d0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49886", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49886-3477@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49887", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49887-04ba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49888", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49888-027c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49889", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49889-6140@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49890", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49890-ba65@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49891", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49891-931a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49892", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49892-b04d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49893", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49893-72a4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49894", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49894-08a0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49858", "url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49858-b7c4@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49859", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49859-9917@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49860", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49860-2a48@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49861", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49861-5288@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49862", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49862-b995@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50022", "url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50022-0531@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50023", "url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50023-0e72@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50024", "url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50024-a052@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49955", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49955-f517@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50025", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50025-38d8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50026", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50026-a7cf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50027", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50027-91e1@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50028", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50028-5655@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49959", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49959-ce09@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49960", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49960-f9cb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49961", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49961-7541@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49962", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49962-8d16@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49963", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49963-a198@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49964", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49964-e06e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50043", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50043-86f8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50044", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50044-2ee1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50045", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50045-283d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50046", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50046-a9b4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50047", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50047-7a27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50048", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50048-f299@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50049", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50049-26da@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50055", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50055-7d1f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50056", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50056-78bf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50057", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50057-d046@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50058", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50058-e827@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50059", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50059-4ccd@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50060", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50060-6994@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49985", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49985-0b2a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49986", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49986-19eb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49987", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49987-e897@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50061", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50061-50ab@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50062", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50062-1ea1@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50063", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50063-1a59@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50064", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50064-33d1@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50065", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50065-c751@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49988", "url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49988-89d5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49989", "url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49989-8165@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49990", "url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49990-c3e9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49991", "url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49991-59d4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49992", "url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49992-fd66@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49993", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49993-5b57@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49994", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49994-de99@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49995", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49995-ec59@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49996", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49996-0d29@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49997", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49997-0d01@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49998", "url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-49998-1a69@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49999", "url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-49999-e815@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50000", "url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50000-c542@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50001", "url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50001-67e4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50002", "url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50002-bdfd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48983", "url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48983-7e0c@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48987", "url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48987-c88b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48988", "url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48988-188f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48989", "url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48989-54c3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48990", "url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48990-1cf1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48991", "url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48991-3987@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48992", "url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48992-2962@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49850", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2024-49850-4cc6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49851", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2024-49851-edd9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49852", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2024-49852-875e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49016", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49016-c7bb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49017", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49017-ae90@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49018", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49018-7ee3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49019", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49019-435d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49853", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49853-b3ea@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49854", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49854-1ba5@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49855", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49855-8997@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49020", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49020-2d32@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49021", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49021-9979@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49022", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49022-c605@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49023", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49023-381d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49024", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49024-e31a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49856", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2024-49856-f5f7@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49857", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2024-49857-7233@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49025", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49025-4bcc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49026", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49026-f8d1@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49027", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49027-3006@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49028", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49028-78e7@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49029", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49029-0ffd@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49030", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49030-cee8@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49031", "url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49031-5b75@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49032", "url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49032-d2a1@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49033", "url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49033-a8c6@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-52917", "url": "https://lore.kernel.org/linux-cve-announce/2024102100-CVE-2023-52917-f16d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47675", "url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47675-643d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47722", "url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47722-dc6e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47723", "url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47723-d904@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47724", "url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47724-c771@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47725", "url": "https://lore.kernel.org/linux-cve-announce/2024102104-CVE-2024-47725-f698@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47676", "url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47676-016b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47727", "url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47727-1049@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47728", "url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47728-824a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47677", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47677-714d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47678", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47678-0b1b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47679", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47679-e793@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47680", "url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47680-194f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47681", "url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47681-bd36@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47682", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47682-0582@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47683", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47683-8cf2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47684", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47684-4869@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47736", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47736-712a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47737", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47737-b77e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47738", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47738-3f0e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47685", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47685-af1e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47686", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47686-e46a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47687", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47687-9a03@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47739", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47739-8bc4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47740", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47740-ae86@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47688", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47688-0fe1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47689", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47689-cdec@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47690", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47690-113f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47741", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47741-5974@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47742", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47742-b72d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47743", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47743-77c3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47691", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47691-ab21@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47692", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47692-38d2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47744", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47744-7571@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47745", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47745-42e6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47746", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47746-f737@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47693", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47693-f12d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47694", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47694-5594@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47695", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47695-2d7b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47747", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47747-8dca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47748", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47748-a134@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47696", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47696-e1f7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47697", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47697-5277@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47698", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47698-d5fe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47699", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47699-c54c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47700", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47700-00ff@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47701", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47701-7db5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47702", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47702-c5c4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47703", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47703-36ea@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49875", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49875-02ba@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47704", "url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47704-d937@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47705", "url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47705-12bc@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47706", "url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47706-7312@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49883", "url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49883-ca93@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49884", "url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49884-fa56@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47707", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47707-d8db@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47708", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47708-2b8f@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47709", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47709-8e66@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47710", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47710-3882@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47711", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47711-349d@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47712", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47712-13c2@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47713", "url": "https://lore.kernel.org/linux-cve-announce/2024102119-CVE-2024-47713-2624@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47714", "url": "https://lore.kernel.org/linux-cve-announce/2024102119-CVE-2024-47714-f88b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47715", "url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47715-ff4e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47716", "url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47716-72df@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47717", "url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47717-f7fc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47718", "url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47718-c7cd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47719", "url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47719-09a2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47720", "url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47720-c007@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47721", "url": "https://lore.kernel.org/linux-cve-announce/2024102122-CVE-2024-47721-cb0a@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49915", "url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49915-42ec@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49916", "url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49916-3384@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49920", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49920-038d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49921", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49921-621b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49922", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49922-5435@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49923", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49923-3462@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49924", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49924-93af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49925", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49925-b469@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49926", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49926-f707@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49927", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49927-86cf@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49928", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49928-05d6@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49929", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49929-1031@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49930", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49930-34e8@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50019", "url": "https://lore.kernel.org/linux-cve-announce/2024102126-CVE-2024-50019-5896@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50020", "url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50020-e41a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50021", "url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50021-d60d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49956", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49956-5278@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50029", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50029-8df2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49957", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49957-3302@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49958", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49958-1bc6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50030", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50030-13ae@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50031", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50031-c158@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50032", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50032-e7ba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50033", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50033-ce5e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50034", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50034-46ef@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49965", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49965-9ed0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49966", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49966-2893@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50035", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50035-82d8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50036", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50036-9d91@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50037", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50037-770e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50038", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50038-dc41@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50039", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50039-41b0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50040", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50040-f156@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49967", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49967-a58a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49968", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49968-ce10@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49969", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49969-cf83@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49970", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49970-a345@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49971", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49971-ad07@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50041", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50041-6118@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50042", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50042-ca9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49972", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49972-9c6d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49973", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49973-8824@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49974", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49974-bda6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49975", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49975-4533@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49976", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49976-83a3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49977", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49977-b657@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49978", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49978-2bff@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49979", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49979-f897@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49980", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49980-da73@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49981", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49981-0fb7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49982", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49982-c6b7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49983", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49983-275e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49984", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49984-e47f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48946", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2022-48946-5989@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48947", "url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48947-0ab5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48948", "url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48948-588a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48949", "url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48949-a7a1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48950", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48950-dc5f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48951", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48951-da5f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48952", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48952-a932@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48953", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48953-c6c0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48954", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48954-30f2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48955", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48955-d31e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48956", "url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48956-75c8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48957", "url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48957-8250@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48958", "url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48958-bb88@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48959", "url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48959-6120@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48960", "url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48960-c9af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48961", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48961-d44b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48962", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48962-1842@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48963", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48963-9cf2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48964", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48964-8230@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48965", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48965-0039@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48966", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48966-d8f6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48967", "url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48967-c2ae@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48968", "url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48968-9b4a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48969", "url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48969-8fe7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48970", "url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48970-7c96@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48971", "url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48971-6025@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48972", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48972-4ccd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48973", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48973-a0e7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48974", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48974-d2d0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48975", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48975-d7f9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48976", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48976-2980@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48977", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48977-0990@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48978", "url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48978-8a19@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48979", "url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48979-d40f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48980", "url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48980-0fec@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48981", "url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48981-a877@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48982", "url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48982-717d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48984", "url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48984-ea9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48985", "url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48985-40b5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48986", "url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48986-cd7d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48993", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48993-8b27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48994", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48994-530f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48995", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48995-8d2e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48996", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48996-e9ca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48997", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48997-cd65@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48998", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48998-1016@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48999", "url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-48999-c5fd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49000", "url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49000-2c9c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49001", "url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49001-589c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49002", "url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49002-5b24@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49003", "url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49003-482c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49004", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49004-18ac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49005", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49005-c5ba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49006", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49006-83c9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49007", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49007-c02b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49008", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49008-d62f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49009", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49009-9bee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49010", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49010-f8e1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49011", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49011-069a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49012", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49012-8eb3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49013", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49013-dd61@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49014", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49014-1627@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49015", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49015-1fd0@gregkh/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14500-1 vom 2024-11-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4038-1 vom 2024-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7123-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5818 vom 2024-11-24", "url": "https://lists.debian.org/debian-security-announce/2024/msg00233.html" }, { "category": "external", "summary": "Google Container-Optimized OS Release Notes vom 2024-11-18", "url": "https://cloud.google.com/container-optimized-os/docs/release-notes#November_18_2024" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4081-1 vom 2024-11-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4157-1 vom 2024-12-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019904.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09", "url": "https://linux.oracle.com/errata/ELSA-2024-12868.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10942 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10942" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10939" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10943 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10943" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10944 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10944" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10939.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10943 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10943.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4317-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4313-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PCO2TL4OCZ4YUXTF7OMLI6WH3WKDUC2G/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7170-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7170-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7173-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7173-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4345-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4346-1 vom 2024-12-17", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2FJJW5HEWYSYWAJBRWARBIZ4AQHAXLNG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7169-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7169-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7167-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7167-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7166-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11486 vom 2024-12-19", "url": "https://access.redhat.com/errata/RHSA-2024:11486" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", "url": "https://linux.oracle.com/errata/ELSA-2024-12887.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:10944 vom 2024-12-19", "url": "https://errata.build.resf.org/RLSA-2024:10944" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7169-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7169-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-074 vom 2024-12-19", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-074.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4388-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-059 vom 2024-12-19", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-059.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-088 vom 2024-12-19", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-088.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7166-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4397-1 vom 2024-12-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7173-2 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7173-2" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-11486 vom 2025-01-07", "url": "https://linux.oracle.com/errata/ELSA-2024-11486.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7184-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7184-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7187-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7187-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7186-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7183-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7183-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7169-3 vom 2025-01-07", "url": "https://ubuntu.com/security/notices/USN-7169-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7167-2 vom 2025-01-07", "url": "https://ubuntu.com/security/notices/USN-7167-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7169-4 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7169-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7185-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7185-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7195-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7186-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7169-5 vom 2025-01-10", "url": "https://ubuntu.com/security/notices/USN-7169-5" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0089-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0090-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020101.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0106-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14", "url": "https://ubuntu.com/security/notices/USN-7195-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0094-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0097-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0105-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0098-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020106.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0100-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0103-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0108-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020111.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0111-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2IXCN5JTEUUWORLKQVOQYQKMHTJ73CSG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0114-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YC7MKFCHLBJHUQM2SLPOGVG4DUWP2J4E/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0112-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VKNKHAJX3LTXNPTXUJXVJL67P2P7Z7YO/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0110-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PLWCG227VUGPKNXHW6FOCW727UUPVLLU/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7173-3 vom 2025-01-15", "url": "https://ubuntu.com/security/notices/USN-7173-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0124-1 vom 2025-01-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0132-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/U2TCRAW6MN33ZU3TBEQGGYRWFSJ6BPOU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0131-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0123-1 vom 2025-01-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020126.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0136-1 vom 2025-01-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2VG6PE7ZMNWIM7E4TIKCXL4DVBGBXJN5/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0137-1 vom 2025-01-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHBMZ4MND2ONRG4N26VJNJGAZBXMYEDV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0138-1 vom 2025-01-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ET3TDUWYDTZV554NRC7LB5HGM4TCIIGZ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0146-1 vom 2025-01-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C6ANXHEO54VUUFEWI6QYB2M3L2SS7OOW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0172-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020164.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0177-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020162.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0164-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0185-1 vom 2025-01-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020171.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0180-1 vom 2025-01-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020174.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0181-1 vom 2025-01-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-079 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-079.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-078 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-078.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0240-1 vom 2025-01-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCBYAV5OJRXD362FDCZUSIHNHOURONCF/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0239-1 vom 2025-01-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBKJOKHJGUZRHPVCGSRZVBF6ZMI7KJY7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0238-1 vom 2025-01-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNU4IXTEAXCI7QNPC2AVXZICYTGC4XXI/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-090 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-090.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-061 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-061.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0249-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0253-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0246-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0245-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0244-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0254-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020213.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0260-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0264-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0243-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20066 vom 2025-01-28", "url": "https://linux.oracle.com/errata/ELSA-2025-20066.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7237-1 vom 2025-01-28", "url": "https://ubuntu.com/security/notices/USN-7237-1" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14705-1 vom 2025-01-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-198 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-198.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-196 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-196.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-092 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-092.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-195 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-195.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-197 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-197.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2745 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2745.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1957 vom 2025-02-05", "url": "https://alas.aws.amazon.com/ALAS-2025-1957.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5860 vom 2025-02-08", "url": "https://lists.debian.org/debian-security-announce/2025/msg00023.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20095 vom 2025-02-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20095.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0410-1 vom 2025-02-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0428-1 vom 2025-02-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0426-1 vom 2025-02-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020303.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0440-1 vom 2025-02-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020319.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20100 vom 2025-02-13", "url": "https://linux.oracle.com/errata/ELSA-2025-20100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0462-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CNVHBWUSJZEY34QR6GDPRY55WG3UIDSL/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0476-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VFHWMM4XIDZD22QFLM3OSRWWSFFBUTZM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0494-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6OLOLTOPB2LMYQP5ZEWFA5S443WHFDIQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0486-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XWFV7VUE5TX6GKXVI46R6ZIDRFEXHKUZ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0489-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OCZ53J3OQFQB3VZIF7V6BL32FWNAV3CH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0462-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNVHBWUSJZEY34QR6GDPRY55WG3UIDSL/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0449-1 vom 2025-02-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020322.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0494-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6OLOLTOPB2LMYQP5ZEWFA5S443WHFDIQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0487-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QIBJK3XANPM2U6AEOTGJ27N3L472DCRE/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0455-1 vom 2025-02-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020321.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0452-1 vom 2025-02-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020320.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0465-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IZBNMZ4JWAINQUJYDC5JJYGAKWUST46Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0499-1 vom 2025-02-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0557-1 vom 2025-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0564-1 vom 2025-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1960 vom 2025-02-19", "url": "https://alas.aws.amazon.com/ALAS-2025-1960.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7276-1 vom 2025-02-19", "url": "https://ubuntu.com/security/notices/USN-7276-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7277-1 vom 2025-02-19", "url": "https://ubuntu.com/security/notices/USN-7277-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7288-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7289-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7291-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7291-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7288-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7293-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7293-1" }, { "category": "external", "summary": "IBM Security Bulletin 7184085 vom 2025-02-25", "url": "https://www.ibm.com/support/pages/node/7184085" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7295-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2759 vom 2025-02-25", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2759.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7294-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-094 vom 2025-02-25", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-094.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-063 vom 2025-02-25", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-063.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7301-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7301-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7294-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7289-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7308-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7294-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7303-2 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7303-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7310-1 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7310-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7311-1 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7311-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4075 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4076 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03", "url": "https://ubuntu.com/security/notices/USN-7294-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7303-3 vom 2025-03-03", "url": "https://ubuntu.com/security/notices/USN-7303-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2270 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:2270" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1912 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:1912" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7333-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7333-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7332-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0784-1 vom 2025-03-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7331-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7331-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-203 vom 2025-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-203.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-204 vom 2025-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-204.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-205 vom 2025-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-205.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-202 vom 2025-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-202.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1961 vom 2025-03-06", "url": "https://alas.aws.amazon.com/ALAS-2025-1961.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2775 vom 2025-03-07", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2775.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20152 vom 2025-03-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20152.html" }, { "category": "external", "summary": "IBM Security Bulletin 7185244 vom 2025-03-10", "url": "https://www.ibm.com/support/pages/node/7185244" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7344-1 vom 2025-03-11", "url": "https://ubuntu.com/security/notices/USN-7344-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7342-1 vom 2025-03-11", "url": "https://ubuntu.com/security/notices/USN-7342-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-2 vom 2025-03-11", "url": "https://ubuntu.com/security/notices/USN-7332-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-3 vom 2025-03-13", "url": "https://ubuntu.com/security/notices/USN-7332-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7344-2 vom 2025-03-13", "url": "https://ubuntu.com/security/notices/USN-7344-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-082 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-082.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-083 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-083.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1966 vom 2025-03-17", "url": "https://alas.aws.amazon.com/ALAS-2025-1966.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20190 vom 2025-03-21", "url": "https://linux.oracle.com/errata/ELSA-2025-20190.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2800 vom 2025-03-26", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2800.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7386-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7386-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7387-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7385-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7385-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7383-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7383-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7384-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7384-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7383-2 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7383-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7391-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7393-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7392-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7392-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4102 vom 2025-04-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7384-2 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7384-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7392-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7392-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7401-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7403-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7403-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1114-1 vom 2025-04-02", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GFUVKSUXYRNYGI6ZX3V2THDXSA47UNT/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7407-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1121-1 vom 2025-04-02", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/N43CHCB2GP64EHTUHJOPVKKKNZQRWP2Y/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1119-1 vom 2025-04-02", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SBLYTUS3TCCWSW237VUH6AAY5NVYUZ3T/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1139-1 vom 2025-04-03", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MMCQJLNQTFQY3ASC2RY677DDWALMOJCQ/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7413-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1123-1 vom 2025-04-03", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RBJNUDBE6VPHIDCFIVWE7AFUQ2E2P436/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7421-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7429-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7428-2 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7428-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7429-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7428-1 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7428-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5900 vom 2025-04-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1225-1 vom 2025-04-14", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMQIDOZZ3LRBGKAI3UWUKDCXNJWRXYGY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1213-1 vom 2025-04-14", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/64D5YFJLDESGQOR3OGPOEV5S4M3DYYAU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1231-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020693.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20271 vom 2025-04-14", "url": "https://linux.oracle.com/errata/ELSA-2025-20271.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1236-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020691.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1254-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020695.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1248-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020697.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1259-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020698.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1260-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5C772I5KLAAUMXFCSPXGHE5ETFPZGIIY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1278-1 vom 2025-04-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020701.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1262-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YQ5OGGLUK4JYNQDMHQJCE7NAM5KWAUQ6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2826 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2826.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1970 vom 2025-04-17", "url": "https://alas.aws.amazon.com/ALAS-2025-1970.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7451-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7453-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7452-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7449-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7450-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7462-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7462-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7449-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7459-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7463-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7461-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7461-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7462-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7462-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7461-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7461-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7458-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5907 vom 2025-04-27", "url": "https://lists.debian.org/debian-security-announce/2025/msg00069.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7459-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7468-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-227 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-227.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-224 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-224.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-100 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-100.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-226 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-226.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-225 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-225.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-228 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-228.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html" }, { "category": "external", "summary": "Kyocera Downloads", "url": "https://www.kyoceradocumentsolutions.us/en/support/downloads.name-L3VzL2VuL3NvZnR3YXJlL0tZT0NFUkFERVZJQ0VNQU5BR0VS.html#tab=application" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7461-3 vom 2025-05-02", "url": "https://ubuntu.com/security/notices/USN-7461-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4509 vom 2025-05-06", "url": "https://access.redhat.com/errata/RHSA-2025:4509" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13", "url": "https://ubuntu.com/security/notices/USN-7506-4" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7532 vom 2025-05-14", "url": "https://access.redhat.com/errata/RHSA-2025:7532" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7531 vom 2025-05-14", "url": "https://access.redhat.com/errata/RHSA-2025:7531" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7676 vom 2025-05-15", "url": "https://access.redhat.com/errata/RHSA-2025:7676" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7683 vom 2025-05-16", "url": "https://access.redhat.com/errata/RHSA-2025:7683" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7516-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7514-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7513-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-7531 vom 2025-05-17", "url": "http://linux.oracle.com/errata/ELSA-2025-7531.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7515-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7510-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7511-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7513-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7511-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7512-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7510-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7517-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7518-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7522-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7515-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7516-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7511-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7523-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21", "url": "https://ubuntu.com/security/notices/USN-7517-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21", "url": "https://ubuntu.com/security/notices/USN-7516-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23", "url": "https://ubuntu.com/security/notices/USN-7516-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7524-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7517-3" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7516-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27", "url": "https://ubuntu.com/security/notices/USN-7510-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7510-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7510-8" }, { "category": "external", "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-8" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-9" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-7" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30", "url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20285-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20191-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06", "url": "https://ubuntu.com/security/notices/USN-7553-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-6" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01840-1 vom 2025-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021434.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01853-1 vom 2025-06-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021441.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01869-1 vom 2025-06-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021449.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01873-1 vom 2025-06-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021451.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20372 vom 2025-06-12", "url": "https://linux.oracle.com/errata/ELSA-2025-20372.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20386-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021483.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20388-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021481.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20384-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021485.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01930-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021497.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20381-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021488.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01932-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021501.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20400-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021522.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250613-0011 vom 2025-06-13", "url": "https://security.netapp.com/advisory/NTAP-20250613-0011" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20397-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021525.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-095 vom 2025-06-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-095.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7593-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26", "url": "https://ubuntu.com/security/notices/USN-7602-1" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250627-0002 vom 2025-06-27", "url": "https://security.netapp.com/advisory/NTAP-20250627-0002" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250627-0005 vom 2025-06-27", "url": "https://security.netapp.com/advisory/NTAP-20250627-0005" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01", "url": "https://ubuntu.com/security/notices/USN-7607-1" }, { "category": "external", "summary": "SEM 2025.2.1 release notes vom 2025-07-02", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-3 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7608-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7608-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-1 vom 2025-07-01", "url": "https://ubuntu.com/security/notices/USN-7608-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7607-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-4 vom 2025-07-03", "url": "https://ubuntu.com/security/notices/USN-7608-4" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08", "url": "https://linux.oracle.com/errata/ELSA-2025-20406.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7627-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-5 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7608-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08", "url": "https://ubuntu.com/security/notices/USN-7627-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7607-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0113-1 vom 2025-07-10", "url": "https://ubuntu.com/security/notices/LSN-0113-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-6 vom 2025-07-11", "url": "https://ubuntu.com/security/notices/USN-7608-6" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16", "url": "https://ubuntu.com/security/notices/USN-7640-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7653-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7653-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7651-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7652-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7652-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7651-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-3 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7651-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7651-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-5 vom 2025-07-24", "url": "https://ubuntu.com/security/notices/USN-7651-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-6 vom 2025-07-24", "url": "https://ubuntu.com/security/notices/USN-7651-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25", "url": "https://ubuntu.com/security/notices/USN-7671-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7671-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-7 vom 2025-07-30", "url": "https://ubuntu.com/security/notices/USN-7608-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7684-2 vom 2025-07-31", "url": "https://ubuntu.com/security/notices/USN-7684-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7684-1 vom 2025-07-31", "url": "https://ubuntu.com/security/notices/USN-7684-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7684-3 vom 2025-07-31", "url": "https://ubuntu.com/security/notices/USN-7684-3" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-100 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-100.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-105 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-105.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04", "url": "https://ubuntu.com/security/notices/USN-7671-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-101 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-101.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-106 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-106.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13", "url": "https://ubuntu.com/security/notices/USN-7685-5" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7701-1 vom 2025-08-19", "url": "https://ubuntu.com/security/notices/USN-7701-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7701-2 vom 2025-08-20", "url": "https://ubuntu.com/security/notices/USN-7701-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7701-3 vom 2025-08-21", "url": "https://ubuntu.com/security/notices/USN-7701-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7712-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7711-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-1 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-2 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7712-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-3 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7727-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03", "url": "https://ubuntu.com/security/notices/USN-7737-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15008 vom 2025-09-04", "url": "https://linux.oracle.com/errata/ELSA-2025-15008.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09", "url": "https://linux.oracle.com/errata/ELSA-2025-20551.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03097-1 vom 2025-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022407.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022420.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10", "url": "https://linux.oracle.com/errata/ELSA-2025-20553.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03108-1 vom 2025-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022413.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJXQ5TFHHXOY34RCSJPZ32PXICETJJAT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03130-1 vom 2025-09-10", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OI7XTGACEWQ2UDCZMU7BMJ53EJTK4DLT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03135-1 vom 2025-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022453.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03156-1 vom 2025-09-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSLXEYDHEPXZRRM6QVD2CNPFQE4HV4IH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03175-1 vom 2025-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022497.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03181-1 vom 2025-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022513.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03186-1 vom 2025-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022508.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03191-1 vom 2025-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022516.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03190-1 vom 2025-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022518.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03209-1 vom 2025-09-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYKN5NGIGIUIQOD7ME5J7EMEHPSJ3AGG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03223-1 vom 2025-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022534.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03226-1 vom 2025-09-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEHWYIR3R7GHFMEAF5GZVX6OYPVERDIJ/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-089 vom 2025-09-16", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-089.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7755-1 vom 2025-09-17", "url": "https://ubuntu.com/security/notices/USN-7755-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20714-1 vom 2025-09-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022558.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7755-2 vom 2025-09-17", "url": "https://ubuntu.com/security/notices/USN-7755-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20711-1 vom 2025-09-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022561.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20703-1 vom 2025-09-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022569.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20698-1 vom 2025-09-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022573.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-09-17T22:00:00.000+00:00", "generator": { "date": "2025-09-18T07:17:02.177+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-3251", "initial_release_date": "2024-10-21T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-21T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-17T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates aufgenommen" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-28T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-02T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE, Red Hat und Oracle Linux aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-01-07T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-08T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-14T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-01-15T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-01-16T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-19T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-20T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-21T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-26T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2025-01-27T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-28T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von openSUSE und SUSE aufgenommen" }, { "date": "2025-02-03T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-04T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-05T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-09T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-02-10T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-02-11T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-12T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-16T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-17T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-19T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-24T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Ubuntu und Amazon aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-04T23:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-05T23:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-03-06T23:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-09T23:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-10T23:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Oracle Linux und IBM aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "67", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-03-12T23:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-03-13T23:00:00.000+00:00", "number": "69", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2025-03-17T23:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-19T23:00:00.000+00:00", "number": "71", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-20T23:00:00.000+00:00", "number": "72", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-03-25T23:00:00.000+00:00", "number": "73", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "74", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "75", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-31T22:00:00.000+00:00", "number": "76", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-02T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-04-07T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-13T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-14T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-04-15T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-16T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-04-21T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-04-23T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-27T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "91", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "92", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-05-01T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-05T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-06T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-12T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "97", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-15T22:00:00.000+00:00", "number": "98", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "99", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2025-05-19T22:00:00.000+00:00", "number": "100", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "101", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "102", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-05-22T22:00:00.000+00:00", "number": "103", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "104", "summary": "Neue Updates von Ubuntu, SUSE und Debian aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "105", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "106", "summary": "Neue Updates von Ubuntu, Debian und Amazon aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "107", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "108", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-05T22:00:00.000+00:00", "number": "109", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "110", "summary": "Neue Updates von Ubuntu, Amazon und SUSE aufgenommen" }, { "date": "2025-06-10T22:00:00.000+00:00", "number": "111", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "112", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2025-06-12T22:00:00.000+00:00", "number": "113", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "114", "summary": "Neue Updates von SUSE und NetApp aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "115", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "116", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2025-06-26T22:00:00.000+00:00", "number": "117", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-29T22:00:00.000+00:00", "number": "118", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2025-07-01T22:00:00.000+00:00", "number": "119", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-03T22:00:00.000+00:00", "number": "120", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "121", "summary": "Neue Updates von Oracle Linux, Ubuntu und SUSE aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "122", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-13T22:00:00.000+00:00", "number": "123", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "124", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "125", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "126", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "127", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "128", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-22T22:00:00.000+00:00", "number": "129", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-23T22:00:00.000+00:00", "number": "130", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-24T22:00:00.000+00:00", "number": "131", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-27T22:00:00.000+00:00", "number": "132", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "133", "summary": "Referenz(en) aufgenommen: EUVD-2025-22875" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "134", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "135", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "136", "summary": "Referenz(en) aufgenommen:" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "137", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "138", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-10T22:00:00.000+00:00", "number": "139", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "140", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-18T22:00:00.000+00:00", "number": "141", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-19T22:00:00.000+00:00", "number": "142", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-20T22:00:00.000+00:00", "number": "143", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "144", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-27T22:00:00.000+00:00", "number": "145", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-28T22:00:00.000+00:00", "number": "146", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "147", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-03T22:00:00.000+00:00", "number": "148", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2025-09-08T22:00:00.000+00:00", "number": "149", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-09-09T22:00:00.000+00:00", "number": "150", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-09-10T22:00:00.000+00:00", "number": "151", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-11T22:00:00.000+00:00", "number": "152", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-14T22:00:00.000+00:00", "number": "153", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-15T22:00:00.000+00:00", "number": "154", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-16T22:00:00.000+00:00", "number": "155", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2025-09-17T22:00:00.000+00:00", "number": "156", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" } ], "status": "final", "version": "156" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Avamar", "product": { "name": "Dell Avamar", "product_id": "T039664", "product_identification_helper": { "cpe": "cpe:/a:dell:avamar:-" } } }, { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Google Container-Optimized OS", "product": { "name": "Google Container-Optimized OS", "product_id": "1607324", "product_identification_helper": { "cpe": "cpe:/o:google:container-optimized_os:-" } } } ], "category": "vendor", "name": "Google" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP11 IF02", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF02", "product_id": "T041397" } }, { "category": "product_version", "name": "7.5.0 UP11 IF02", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11 IF02", "product_id": "T041397-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if02" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "IBM Security Guardium 12.0", "product_id": "T031092", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:12.0" } } } ], "category": "product_name", "name": "Security Guardium" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Kyocera Printer", "product": { "name": "Kyocera Printer", "product_id": "T015471", "product_identification_helper": { "cpe": "cpe:/h:kyocera:printer:-" } } } ], "category": "vendor", "name": "Kyocera" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "Baseboard Management Controller", "product": { "name": "NetApp AFF Baseboard Management Controller", "product_id": "T025086", "product_identification_helper": { "cpe": "cpe:/h:netapp:aff:::baseboard_management_controller" } } } ], "category": "product_name", "name": "AFF" }, { "branches": [ { "category": "product_version", "name": "for VMware vSphere", "product": { "name": "NetApp ActiveIQ Unified Manager for VMware vSphere", "product_id": "T025152", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere" } } } ], "category": "product_name", "name": "ActiveIQ Unified Manager" }, { "branches": [ { "category": "product_version", "name": "Baseboard Management Controller", "product": { "name": "NetApp FAS Baseboard Management Controller", "product_id": "T043535", "product_identification_helper": { "cpe": "cpe:/h:netapp:fas:baseboard_management_controller" } } } ], "category": "product_name", "name": "FAS" }, { "category": "product_name", "name": "NetApp StorageGRID", "product": { "name": "NetApp StorageGRID", "product_id": "920206", "product_identification_helper": { "cpe": "cpe:/a:netapp:storagegrid:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T046484", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T042774", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T042775", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "product_name", "name": "Linux" }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2025.2.1", "product": { "name": "SolarWinds Security Event Manager \u003c2025.2.1", "product_id": "T044986" } }, { "category": "product_version", "name": "2025.2.1", "product": { "name": "SolarWinds Security Event Manager 2025.2.1", "product_id": "T044986-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1" } } } ], "category": "product_name", "name": "Security Event Manager" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10044", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2016-10044" }, { "cve": "CVE-2022-48946", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48946" }, { "cve": "CVE-2022-48947", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48947" }, { "cve": "CVE-2022-48948", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48948" }, { "cve": "CVE-2022-48949", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48949" }, { "cve": "CVE-2022-48950", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48950" }, { "cve": "CVE-2022-48951", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48951" }, { "cve": "CVE-2022-48952", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48952" }, { "cve": "CVE-2022-48953", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48953" }, { "cve": "CVE-2022-48954", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48954" }, { "cve": "CVE-2022-48955", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48955" }, { "cve": "CVE-2022-48956", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48956" }, { "cve": "CVE-2022-48957", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48957" }, { "cve": "CVE-2022-48958", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48958" }, { "cve": "CVE-2022-48959", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48959" }, { "cve": "CVE-2022-48960", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48960" }, { "cve": "CVE-2022-48961", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48961" }, { "cve": "CVE-2022-48962", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48962" }, { "cve": "CVE-2022-48963", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48963" }, { "cve": "CVE-2022-48964", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48964" }, { "cve": "CVE-2022-48965", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48965" }, { "cve": "CVE-2022-48966", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48966" }, { "cve": "CVE-2022-48967", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48967" }, { "cve": "CVE-2022-48968", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48968" }, { "cve": "CVE-2022-48969", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48969" }, { "cve": "CVE-2022-48970", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48970" }, { "cve": "CVE-2022-48971", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48971" }, { "cve": "CVE-2022-48972", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48972" }, { "cve": "CVE-2022-48973", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48973" }, { "cve": "CVE-2022-48974", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48974" }, { "cve": "CVE-2022-48975", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48975" }, { "cve": "CVE-2022-48976", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48976" }, { "cve": "CVE-2022-48977", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48977" }, { "cve": "CVE-2022-48978", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48978" }, { "cve": "CVE-2022-48979", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48979" }, { "cve": "CVE-2022-48980", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48980" }, { "cve": "CVE-2022-48981", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48981" }, { "cve": "CVE-2022-48982", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48982" }, { "cve": "CVE-2022-48983", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48983" }, { "cve": "CVE-2022-48984", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48984" }, { "cve": "CVE-2022-48985", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48985" }, { "cve": "CVE-2022-48986", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48986" }, { "cve": "CVE-2022-48987", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48987" }, { "cve": "CVE-2022-48988", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48988" }, { "cve": "CVE-2022-48989", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48989" }, { "cve": "CVE-2022-48990", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48990" }, { "cve": "CVE-2022-48991", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48991" }, { "cve": "CVE-2022-48992", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48992" }, { "cve": "CVE-2022-48993", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48993" }, { "cve": "CVE-2022-48994", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48994" }, { "cve": "CVE-2022-48995", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48995" }, { "cve": "CVE-2022-48996", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48996" }, { "cve": "CVE-2022-48997", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48997" }, { "cve": "CVE-2022-48998", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48998" }, { "cve": "CVE-2022-48999", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48999" }, { "cve": "CVE-2022-49000", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49000" }, { "cve": "CVE-2022-49001", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49001" }, { "cve": "CVE-2022-49002", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49002" }, { "cve": "CVE-2022-49003", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49003" }, { "cve": "CVE-2022-49004", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49004" }, { "cve": "CVE-2022-49005", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49005" }, { "cve": "CVE-2022-49006", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49006" }, { "cve": "CVE-2022-49007", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49007" }, { "cve": "CVE-2022-49008", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49008" }, { "cve": "CVE-2022-49009", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49009" }, { "cve": "CVE-2022-49010", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49010" }, { "cve": "CVE-2022-49011", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49011" }, { "cve": "CVE-2022-49012", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49012" }, { "cve": "CVE-2022-49013", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49013" }, { "cve": "CVE-2022-49014", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49014" }, { "cve": "CVE-2022-49015", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49015" }, { "cve": "CVE-2022-49016", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49016" }, { "cve": "CVE-2022-49017", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49017" }, { "cve": "CVE-2022-49018", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49018" }, { "cve": "CVE-2022-49019", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49019" }, { "cve": "CVE-2022-49020", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49020" }, { "cve": "CVE-2022-49021", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49021" }, { "cve": "CVE-2022-49022", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49022" }, { "cve": "CVE-2022-49023", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49023" }, { "cve": "CVE-2022-49024", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49024" }, { "cve": "CVE-2022-49025", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49025" }, { "cve": "CVE-2022-49026", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49026" }, { "cve": "CVE-2022-49027", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49027" }, { "cve": "CVE-2022-49028", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49028" }, { "cve": "CVE-2022-49029", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49029" }, { "cve": "CVE-2022-49030", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49030" }, { "cve": "CVE-2022-49031", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49031" }, { "cve": "CVE-2022-49032", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49032" }, { "cve": "CVE-2022-49033", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49033" }, { "cve": "CVE-2023-52917", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2023-52917" }, { "cve": "CVE-2023-52918", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2023-52918" }, { "cve": "CVE-2023-52919", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2023-52919" }, { "cve": "CVE-2023-6270", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2023-6270" }, { "cve": "CVE-2024-47675", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47675" }, { "cve": "CVE-2024-47676", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47676" }, { "cve": "CVE-2024-47677", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47677" }, { "cve": "CVE-2024-47678", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47678" }, { "cve": "CVE-2024-47679", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47679" }, { "cve": "CVE-2024-47680", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47680" }, { "cve": "CVE-2024-47681", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47681" }, { "cve": "CVE-2024-47682", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47682" }, { "cve": "CVE-2024-47683", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47683" }, { "cve": "CVE-2024-47684", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47684" }, { "cve": "CVE-2024-47685", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47685" }, { "cve": "CVE-2024-47686", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47686" }, { "cve": "CVE-2024-47687", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47687" }, { "cve": "CVE-2024-47688", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47688" }, { "cve": "CVE-2024-47689", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47689" }, { "cve": "CVE-2024-47690", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47690" }, { "cve": "CVE-2024-47691", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47691" }, { "cve": "CVE-2024-47692", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47692" }, { "cve": "CVE-2024-47693", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47693" }, { "cve": "CVE-2024-47694", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47694" }, { "cve": "CVE-2024-47695", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47695" }, { "cve": "CVE-2024-47696", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47696" }, { "cve": "CVE-2024-47697", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47697" }, { "cve": "CVE-2024-47698", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47698" }, { "cve": "CVE-2024-47699", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47699" }, { "cve": "CVE-2024-47700", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47700" }, { "cve": "CVE-2024-47701", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47701" }, { "cve": "CVE-2024-47702", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47702" }, { "cve": "CVE-2024-47703", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47703" }, { "cve": "CVE-2024-47704", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47704" }, { "cve": "CVE-2024-47705", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47705" }, { "cve": "CVE-2024-47706", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47706" }, { "cve": "CVE-2024-47707", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47707" }, { "cve": "CVE-2024-47708", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47708" }, { "cve": "CVE-2024-47709", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47709" }, { "cve": "CVE-2024-47710", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47710" }, { "cve": "CVE-2024-47711", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47711" }, { "cve": "CVE-2024-47712", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47712" }, { "cve": "CVE-2024-47713", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47713" }, { "cve": "CVE-2024-47714", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47714" }, { "cve": "CVE-2024-47715", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47715" }, { "cve": "CVE-2024-47716", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47716" }, { "cve": "CVE-2024-47717", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47717" }, { "cve": "CVE-2024-47718", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47718" }, { "cve": "CVE-2024-47719", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47719" }, { "cve": "CVE-2024-47720", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47720" }, { "cve": "CVE-2024-47721", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47721" }, { "cve": "CVE-2024-47722", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47722" }, { "cve": "CVE-2024-47723", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47723" }, { "cve": "CVE-2024-47724", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47724" }, { "cve": "CVE-2024-47725", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47725" }, { "cve": "CVE-2024-47726", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47726" }, { "cve": "CVE-2024-47727", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47727" }, { "cve": "CVE-2024-47728", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47728" }, { "cve": "CVE-2024-47729", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47729" }, { "cve": "CVE-2024-47730", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47730" }, { "cve": "CVE-2024-47731", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47731" }, { "cve": "CVE-2024-47732", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47732" }, { "cve": "CVE-2024-47733", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47733" }, { "cve": "CVE-2024-47734", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47734" }, { "cve": "CVE-2024-47735", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47735" }, { "cve": "CVE-2024-47736", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47736" }, { "cve": "CVE-2024-47737", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47737" }, { "cve": "CVE-2024-47738", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47738" }, { "cve": "CVE-2024-47739", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47739" }, { "cve": "CVE-2024-47740", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47740" }, { "cve": "CVE-2024-47741", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47741" }, { "cve": "CVE-2024-47742", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47742" }, { "cve": "CVE-2024-47743", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47743" }, { "cve": "CVE-2024-47744", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47744" }, { "cve": "CVE-2024-47745", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47745" }, { "cve": "CVE-2024-47746", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47746" }, { "cve": "CVE-2024-47747", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47747" }, { "cve": "CVE-2024-47748", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47748" }, { "cve": "CVE-2024-47749", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47749" }, { "cve": "CVE-2024-47750", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47750" }, { "cve": "CVE-2024-47751", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47751" }, { "cve": "CVE-2024-47752", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47752" }, { "cve": "CVE-2024-47753", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47753" }, { "cve": "CVE-2024-47754", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47754" }, { "cve": "CVE-2024-47755", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47755" }, { "cve": "CVE-2024-47756", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47756" }, { "cve": "CVE-2024-47757", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47757" }, { "cve": "CVE-2024-49850", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49850" }, { "cve": "CVE-2024-49851", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49851" }, { "cve": "CVE-2024-49852", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49852" }, { "cve": "CVE-2024-49853", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49853" }, { "cve": "CVE-2024-49854", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49854" }, { "cve": "CVE-2024-49855", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49855" }, { "cve": "CVE-2024-49856", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49856" }, { "cve": "CVE-2024-49857", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49857" }, { "cve": "CVE-2024-49858", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49858" }, { "cve": "CVE-2024-49859", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49859" }, { "cve": "CVE-2024-49860", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49860" }, { "cve": "CVE-2024-49861", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49861" }, { "cve": "CVE-2024-49862", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49862" }, { "cve": "CVE-2024-49863", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49863" }, { "cve": "CVE-2024-49864", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49864" }, { "cve": "CVE-2024-49865", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49865" }, { "cve": "CVE-2024-49866", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49866" }, { "cve": "CVE-2024-49867", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49867" }, { "cve": "CVE-2024-49868", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49868" }, { "cve": "CVE-2024-49869", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49869" }, { "cve": "CVE-2024-49870", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49870" }, { "cve": "CVE-2024-49871", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49871" }, { "cve": "CVE-2024-49872", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49872" }, { "cve": "CVE-2024-49873", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49873" }, { "cve": "CVE-2024-49874", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49874" }, { "cve": "CVE-2024-49875", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49875" }, { "cve": "CVE-2024-49876", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49876" }, { "cve": "CVE-2024-49877", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49877" }, { "cve": "CVE-2024-49878", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49878" }, { "cve": "CVE-2024-49879", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49879" }, { "cve": "CVE-2024-49880", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49880" }, { "cve": "CVE-2024-49881", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49881" }, { "cve": "CVE-2024-49882", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49882" }, { "cve": "CVE-2024-49883", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49883" }, { "cve": "CVE-2024-49884", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49884" }, { "cve": "CVE-2024-49885", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49885" }, { "cve": "CVE-2024-49886", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49886" }, { "cve": "CVE-2024-49887", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49887" }, { "cve": "CVE-2024-49888", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49888" }, { "cve": "CVE-2024-49889", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49889" }, { "cve": "CVE-2024-49890", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49890" }, { "cve": "CVE-2024-49891", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49891" }, { "cve": "CVE-2024-49892", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49892" }, { "cve": "CVE-2024-49893", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49893" }, { "cve": "CVE-2024-49894", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49894" }, { "cve": "CVE-2024-49895", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49895" }, { "cve": "CVE-2024-49896", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49896" }, { "cve": "CVE-2024-49897", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49897" }, { "cve": "CVE-2024-49898", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49898" }, { "cve": "CVE-2024-49899", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49899" }, { "cve": "CVE-2024-49900", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49900" }, { "cve": "CVE-2024-49901", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49901" }, { "cve": "CVE-2024-49902", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49902" }, { "cve": "CVE-2024-49903", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49903" }, { "cve": "CVE-2024-49905", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49905" }, { "cve": "CVE-2024-49906", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49906" }, { "cve": "CVE-2024-49907", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49907" }, { "cve": "CVE-2024-49908", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49908" }, { "cve": "CVE-2024-49909", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49909" }, { "cve": "CVE-2024-49911", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49911" }, { "cve": "CVE-2024-49912", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49912" }, { "cve": "CVE-2024-49913", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49913" }, { "cve": "CVE-2024-49914", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49914" }, { "cve": "CVE-2024-49915", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49915" }, { "cve": "CVE-2024-49916", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49916" }, { "cve": "CVE-2024-49917", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49917" }, { "cve": "CVE-2024-49918", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49918" }, { "cve": "CVE-2024-49919", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49919" }, { "cve": "CVE-2024-49920", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49920" }, { "cve": "CVE-2024-49921", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49921" }, { "cve": "CVE-2024-49922", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49922" }, { "cve": "CVE-2024-49923", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49923" }, { "cve": "CVE-2024-49924", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49924" }, { "cve": "CVE-2024-49925", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49925" }, { "cve": "CVE-2024-49926", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49926" }, { "cve": "CVE-2024-49927", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49927" }, { "cve": "CVE-2024-49928", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49928" }, { "cve": "CVE-2024-49929", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49929" }, { "cve": "CVE-2024-49930", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49930" }, { "cve": "CVE-2024-49931", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49931" }, { "cve": "CVE-2024-49932", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49932" }, { "cve": "CVE-2024-49933", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49933" }, { "cve": "CVE-2024-49934", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49934" }, { "cve": "CVE-2024-49935", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49935" }, { "cve": "CVE-2024-49936", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49936" }, { "cve": "CVE-2024-49937", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49937" }, { "cve": "CVE-2024-49938", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49938" }, { "cve": "CVE-2024-49939", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49939" }, { "cve": "CVE-2024-49940", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49940" }, { "cve": "CVE-2024-49941", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49941" }, { "cve": "CVE-2024-49942", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49942" }, { "cve": "CVE-2024-49943", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49943" }, { "cve": "CVE-2024-49944", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49944" }, { "cve": "CVE-2024-49945", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49945" }, { "cve": "CVE-2024-49946", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49946" }, { "cve": "CVE-2024-49947", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49947" }, { "cve": "CVE-2024-49948", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49948" }, { "cve": "CVE-2024-49949", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49949" }, { "cve": "CVE-2024-49950", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49950" }, { "cve": "CVE-2024-49951", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49951" }, { "cve": "CVE-2024-49952", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49952" }, { "cve": "CVE-2024-49953", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49953" }, { "cve": "CVE-2024-49954", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49954" }, { "cve": "CVE-2024-49955", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49955" }, { "cve": "CVE-2024-49956", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49956" }, { "cve": "CVE-2024-49957", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49957" }, { "cve": "CVE-2024-49958", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49958" }, { "cve": "CVE-2024-49959", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49959" }, { "cve": "CVE-2024-49960", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49960" }, { "cve": "CVE-2024-49961", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49961" }, { "cve": "CVE-2024-49962", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49962" }, { "cve": "CVE-2024-49963", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49963" }, { "cve": "CVE-2024-49964", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49964" }, { "cve": "CVE-2024-49965", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49965" }, { "cve": "CVE-2024-49966", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49966" }, { "cve": "CVE-2024-49967", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49967" }, { "cve": "CVE-2024-49968", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49968" }, { "cve": "CVE-2024-49969", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49969" }, { "cve": "CVE-2024-49970", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49970" }, { "cve": "CVE-2024-49971", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49971" }, { "cve": "CVE-2024-49972", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49972" }, { "cve": "CVE-2024-49973", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49973" }, { "cve": "CVE-2024-49974", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49974" }, { "cve": "CVE-2024-49975", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49975" }, { "cve": "CVE-2024-49976", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49976" }, { "cve": "CVE-2024-49977", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49977" }, { "cve": "CVE-2024-49978", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49978" }, { "cve": "CVE-2024-49979", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49979" }, { "cve": "CVE-2024-49980", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49980" }, { "cve": "CVE-2024-49981", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49981" }, { "cve": "CVE-2024-49982", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49982" }, { "cve": "CVE-2024-49983", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49983" }, { "cve": "CVE-2024-49984", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49984" }, { "cve": "CVE-2024-49985", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49985" }, { "cve": "CVE-2024-49986", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49986" }, { "cve": "CVE-2024-49987", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49987" }, { "cve": "CVE-2024-49988", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49988" }, { "cve": "CVE-2024-49989", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49989" }, { "cve": "CVE-2024-49990", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49990" }, { "cve": "CVE-2024-49991", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49991" }, { "cve": "CVE-2024-49992", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49992" }, { "cve": "CVE-2024-49993", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49993" }, { "cve": "CVE-2024-49994", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49994" }, { "cve": "CVE-2024-49995", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49995" }, { "cve": "CVE-2024-49996", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49996" }, { "cve": "CVE-2024-49997", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49997" }, { "cve": "CVE-2024-49998", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49998" }, { "cve": "CVE-2024-49999", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49999" }, { "cve": "CVE-2024-50000", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50000" }, { "cve": "CVE-2024-50001", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50001" }, { "cve": "CVE-2024-50002", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50002" }, { "cve": "CVE-2024-50003", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50003" }, { "cve": "CVE-2024-50004", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50004" }, { "cve": "CVE-2024-50005", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50005" }, { "cve": "CVE-2024-50006", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50006" }, { "cve": "CVE-2024-50007", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50007" }, { "cve": "CVE-2024-50008", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50008" }, { "cve": "CVE-2024-50009", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50009" }, { "cve": "CVE-2024-50010", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50010" }, { "cve": "CVE-2024-50011", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50011" }, { "cve": "CVE-2024-50012", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50012" }, { "cve": "CVE-2024-50013", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50013" }, { "cve": "CVE-2024-50014", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50014" }, { "cve": "CVE-2024-50015", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50015" }, { "cve": "CVE-2024-50016", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50016" }, { "cve": "CVE-2024-50017", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50017" }, { "cve": "CVE-2024-50018", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50018" }, { "cve": "CVE-2024-50019", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50019" }, { "cve": "CVE-2024-50020", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50020" }, { "cve": "CVE-2024-50021", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50021" }, { "cve": "CVE-2024-50022", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50022" }, { "cve": "CVE-2024-50023", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50023" }, { "cve": "CVE-2024-50024", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50024" }, { "cve": "CVE-2024-50025", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50025" }, { "cve": "CVE-2024-50026", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50026" }, { "cve": "CVE-2024-50027", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50027" }, { "cve": "CVE-2024-50028", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50028" }, { "cve": "CVE-2024-50029", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50029" }, { "cve": "CVE-2024-50030", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50030" }, { "cve": "CVE-2024-50031", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50031" }, { "cve": "CVE-2024-50032", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50032" }, { "cve": "CVE-2024-50033", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50033" }, { "cve": "CVE-2024-50034", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50034" }, { "cve": "CVE-2024-50035", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50035" }, { "cve": "CVE-2024-50036", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50036" }, { "cve": "CVE-2024-50037", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50037" }, { "cve": "CVE-2024-50038", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50038" }, { "cve": "CVE-2024-50039", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50039" }, { "cve": "CVE-2024-50040", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50040" }, { "cve": "CVE-2024-50041", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50041" }, { "cve": "CVE-2024-50042", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50042" }, { "cve": "CVE-2024-50043", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50043" }, { "cve": "CVE-2024-50044", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50044" }, { "cve": "CVE-2024-50045", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50045" }, { "cve": "CVE-2024-50046", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50046" }, { "cve": "CVE-2024-50047", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50047" }, { "cve": "CVE-2024-50048", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50048" }, { "cve": "CVE-2024-50049", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50049" }, { "cve": "CVE-2024-50055", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50055" }, { "cve": "CVE-2024-50056", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50056" }, { "cve": "CVE-2024-50057", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50057" }, { "cve": "CVE-2024-50058", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50058" }, { "cve": "CVE-2024-50059", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50059" }, { "cve": "CVE-2024-50060", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50060" }, { "cve": "CVE-2024-50061", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50061" }, { "cve": "CVE-2024-50062", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50062" }, { "cve": "CVE-2024-50063", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50063" }, { "cve": "CVE-2024-50064", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50064" }, { "cve": "CVE-2024-50065", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50065" } ] }
wid-sec-w-2024-3251
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder andere, nicht n\u00e4her bekannte Auswirkungen zu erzielen..", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3251 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3251.json" }, { "category": "self", "summary": "WID-SEC-2024-3251 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3251" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47726", "url": "https://lore.kernel.org/linux-cve-announce/2024102104-CVE-2024-47726-ae53@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47729", "url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47729-8985@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47730", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47730-2f1e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47731", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47731-fd73@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47732", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47732-f8aa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50003", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-50003-43bc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47733", "url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47733-6591@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47734", "url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47734-ad75@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47735", "url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47735-5d51@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50004", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50004-101e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50005", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50005-3479@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50006", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50006-fe44@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50007", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50007-0253@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50008", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50008-0152@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50009", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50009-1b62@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50010", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50010-57e8@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50011", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50011-98c9@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50012", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50012-db7d@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49863", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-49863-6a74@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50013", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50013-05ef@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50014", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50014-d684@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50015", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50015-1eb0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50016", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50016-745a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50017", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50017-f157@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50018", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-50018-65e9@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47749", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47749-c227@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47750", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47750-390b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47751", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47751-7a96@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47752", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47752-1b11@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49864", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49864-5158@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49865", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49865-ae89@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49866", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49866-159b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49867", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49867-b47a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49868", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49868-8dce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47753", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47753-45cf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47754", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47754-a412@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49869", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49869-f804@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49870", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49870-44f0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49871", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49871-1293@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49872", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49872-16d4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49873", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49873-3190@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47755", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47755-2cb3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47756", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47756-1c60@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47757", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47757-2b1e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49874", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49874-6deb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49876", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49876-7fe2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49877", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49877-038a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49885", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49885-d5d0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49886", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49886-3477@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49887", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49887-04ba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49888", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49888-027c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49889", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49889-6140@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49890", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49890-ba65@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49891", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49891-931a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49892", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49892-b04d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49893", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49893-72a4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49894", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49894-08a0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49858", "url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49858-b7c4@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49859", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49859-9917@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49860", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49860-2a48@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49861", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49861-5288@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49862", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49862-b995@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50022", "url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50022-0531@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50023", "url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50023-0e72@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50024", "url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50024-a052@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49955", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49955-f517@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50025", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50025-38d8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50026", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50026-a7cf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50027", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50027-91e1@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50028", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50028-5655@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49959", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49959-ce09@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49960", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49960-f9cb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49961", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49961-7541@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49962", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49962-8d16@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49963", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49963-a198@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49964", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49964-e06e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50043", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50043-86f8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50044", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50044-2ee1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50045", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50045-283d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50046", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50046-a9b4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50047", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50047-7a27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50048", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50048-f299@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50049", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50049-26da@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50055", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50055-7d1f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50056", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50056-78bf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50057", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50057-d046@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50058", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50058-e827@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50059", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50059-4ccd@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50060", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50060-6994@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49985", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49985-0b2a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49986", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49986-19eb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49987", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49987-e897@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50061", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50061-50ab@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50062", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50062-1ea1@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50063", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50063-1a59@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50064", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50064-33d1@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50065", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50065-c751@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49988", "url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49988-89d5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49989", "url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49989-8165@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49990", "url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49990-c3e9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49991", "url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49991-59d4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49992", "url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49992-fd66@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49993", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49993-5b57@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49994", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49994-de99@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49995", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49995-ec59@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49996", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49996-0d29@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49997", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49997-0d01@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49998", "url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-49998-1a69@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49999", "url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-49999-e815@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50000", "url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50000-c542@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50001", "url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50001-67e4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50002", "url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50002-bdfd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48983", "url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48983-7e0c@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48987", "url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48987-c88b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48988", "url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48988-188f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48989", "url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48989-54c3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48990", "url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48990-1cf1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48991", "url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48991-3987@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48992", "url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48992-2962@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49850", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2024-49850-4cc6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49851", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2024-49851-edd9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49852", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2024-49852-875e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49016", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49016-c7bb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49017", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49017-ae90@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49018", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49018-7ee3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49019", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49019-435d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49853", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49853-b3ea@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49854", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49854-1ba5@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49855", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49855-8997@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49020", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49020-2d32@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49021", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49021-9979@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49022", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49022-c605@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49023", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49023-381d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49024", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49024-e31a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49856", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2024-49856-f5f7@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49857", "url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2024-49857-7233@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49025", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49025-4bcc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49026", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49026-f8d1@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49027", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49027-3006@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49028", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49028-78e7@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49029", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49029-0ffd@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49030", "url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49030-cee8@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49031", "url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49031-5b75@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49032", "url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49032-d2a1@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49033", "url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49033-a8c6@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-52917", "url": "https://lore.kernel.org/linux-cve-announce/2024102100-CVE-2023-52917-f16d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47675", "url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47675-643d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47722", "url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47722-dc6e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47723", "url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47723-d904@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47724", "url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47724-c771@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47725", "url": "https://lore.kernel.org/linux-cve-announce/2024102104-CVE-2024-47725-f698@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47676", "url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47676-016b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47727", "url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47727-1049@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47728", "url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47728-824a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47677", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47677-714d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47678", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47678-0b1b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47679", "url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47679-e793@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47680", "url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47680-194f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47681", "url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47681-bd36@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47682", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47682-0582@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47683", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47683-8cf2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47684", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47684-4869@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47736", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47736-712a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47737", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47737-b77e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47738", "url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47738-3f0e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47685", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47685-af1e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47686", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47686-e46a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47687", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47687-9a03@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47739", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47739-8bc4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47740", "url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47740-ae86@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47688", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47688-0fe1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47689", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47689-cdec@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47690", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47690-113f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47741", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47741-5974@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47742", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47742-b72d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47743", "url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47743-77c3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47691", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47691-ab21@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47692", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47692-38d2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47744", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47744-7571@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47745", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47745-42e6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47746", "url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47746-f737@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47693", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47693-f12d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47694", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47694-5594@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47695", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47695-2d7b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47747", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47747-8dca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47748", "url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47748-a134@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47696", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47696-e1f7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47697", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47697-5277@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47698", "url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47698-d5fe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47699", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47699-c54c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47700", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47700-00ff@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47701", "url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47701-7db5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47702", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47702-c5c4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47703", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47703-36ea@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49875", "url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49875-02ba@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47704", "url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47704-d937@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47705", "url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47705-12bc@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47706", "url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47706-7312@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49883", "url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49883-ca93@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49884", "url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49884-fa56@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47707", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47707-d8db@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47708", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47708-2b8f@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47709", "url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47709-8e66@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47710", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47710-3882@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47711", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47711-349d@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47712", "url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47712-13c2@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47713", "url": "https://lore.kernel.org/linux-cve-announce/2024102119-CVE-2024-47713-2624@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47714", "url": "https://lore.kernel.org/linux-cve-announce/2024102119-CVE-2024-47714-f88b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47715", "url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47715-ff4e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47716", "url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47716-72df@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47717", "url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47717-f7fc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47718", "url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47718-c7cd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47719", "url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47719-09a2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47720", "url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47720-c007@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-47721", "url": "https://lore.kernel.org/linux-cve-announce/2024102122-CVE-2024-47721-cb0a@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49915", "url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49915-42ec@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49916", "url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49916-3384@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49920", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49920-038d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49921", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49921-621b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49922", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49922-5435@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49923", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49923-3462@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49924", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49924-93af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49925", "url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49925-b469@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49926", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49926-f707@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49927", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49927-86cf@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49928", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49928-05d6@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49929", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49929-1031@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49930", "url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49930-34e8@gregkh/#u" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50019", "url": "https://lore.kernel.org/linux-cve-announce/2024102126-CVE-2024-50019-5896@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50020", "url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50020-e41a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50021", "url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50021-d60d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49956", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49956-5278@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50029", "url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50029-8df2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49957", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49957-3302@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49958", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49958-1bc6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50030", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50030-13ae@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50031", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50031-c158@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50032", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50032-e7ba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50033", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50033-ce5e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50034", "url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50034-46ef@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49965", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49965-9ed0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49966", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49966-2893@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50035", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50035-82d8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50036", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50036-9d91@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50037", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50037-770e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50038", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50038-dc41@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50039", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50039-41b0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50040", "url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50040-f156@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49967", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49967-a58a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49968", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49968-ce10@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49969", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49969-cf83@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49970", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49970-a345@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49971", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49971-ad07@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50041", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50041-6118@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50042", "url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50042-ca9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49972", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49972-9c6d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49973", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49973-8824@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49974", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49974-bda6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49975", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49975-4533@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49976", "url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49976-83a3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49977", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49977-b657@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49978", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49978-2bff@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49979", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49979-f897@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49980", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49980-da73@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49981", "url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49981-0fb7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49982", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49982-c6b7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49983", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49983-275e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49984", "url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49984-e47f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48946", "url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2022-48946-5989@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48947", "url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48947-0ab5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48948", "url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48948-588a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48949", "url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48949-a7a1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48950", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48950-dc5f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48951", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48951-da5f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48952", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48952-a932@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48953", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48953-c6c0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48954", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48954-30f2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48955", "url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48955-d31e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48956", "url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48956-75c8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48957", "url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48957-8250@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48958", "url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48958-bb88@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48959", "url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48959-6120@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48960", "url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48960-c9af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48961", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48961-d44b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48962", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48962-1842@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48963", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48963-9cf2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48964", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48964-8230@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48965", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48965-0039@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48966", "url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48966-d8f6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48967", "url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48967-c2ae@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48968", "url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48968-9b4a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48969", "url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48969-8fe7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48970", "url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48970-7c96@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48971", "url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48971-6025@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48972", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48972-4ccd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48973", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48973-a0e7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48974", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48974-d2d0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48975", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48975-d7f9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48976", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48976-2980@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48977", "url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48977-0990@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48978", "url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48978-8a19@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48979", "url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48979-d40f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48980", "url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48980-0fec@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48981", "url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48981-a877@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48982", "url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48982-717d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48984", "url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48984-ea9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48985", "url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48985-40b5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48986", "url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48986-cd7d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48993", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48993-8b27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48994", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48994-530f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48995", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48995-8d2e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48996", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48996-e9ca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48997", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48997-cd65@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48998", "url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48998-1016@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-48999", "url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-48999-c5fd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49000", "url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49000-2c9c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49001", "url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49001-589c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49002", "url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49002-5b24@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49003", "url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49003-482c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49004", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49004-18ac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49005", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49005-c5ba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49006", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49006-83c9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49007", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49007-c02b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49008", "url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49008-d62f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49009", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49009-9bee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49010", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49010-f8e1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49011", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49011-069a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49012", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49012-8eb3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49013", "url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49013-dd61@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49014", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49014-1627@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49015", "url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49015-1fd0@gregkh/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12815.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14500-1 vom 2024-11-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4038-1 vom 2024-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7123-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5818 vom 2024-11-24", "url": "https://lists.debian.org/debian-security-announce/2024/msg00233.html" }, { "category": "external", "summary": "Google Container-Optimized OS Release Notes vom 2024-11-18", "url": "https://cloud.google.com/container-optimized-os/docs/release-notes#November_18_2024" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4081-1 vom 2024-11-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4157-1 vom 2024-12-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019904.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09", "url": "https://linux.oracle.com/errata/ELSA-2024-12868.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10942 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10942" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10939" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10943 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10943" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10944 vom 2024-12-11", "url": "https://access.redhat.com/errata/RHSA-2024:10944" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10939.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10943 vom 2024-12-12", "url": "https://linux.oracle.com/errata/ELSA-2024-10943.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7154-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7155-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4317-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4313-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PCO2TL4OCZ4YUXTF7OMLI6WH3WKDUC2G/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7170-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7170-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7173-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7173-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4345-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4346-1 vom 2024-12-17", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2FJJW5HEWYSYWAJBRWARBIZ4AQHAXLNG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7169-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7169-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7167-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7167-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7166-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11486 vom 2024-12-19", "url": "https://access.redhat.com/errata/RHSA-2024:11486" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", "url": "https://linux.oracle.com/errata/ELSA-2024-12887.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:10944 vom 2024-12-19", "url": "https://errata.build.resf.org/RLSA-2024:10944" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7169-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7169-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-074 vom 2024-12-19", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-074.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4388-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-059 vom 2024-12-19", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-059.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-088 vom 2024-12-19", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-088.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7166-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4397-1 vom 2024-12-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7173-2 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7173-2" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-11486 vom 2025-01-07", "url": "https://linux.oracle.com/errata/ELSA-2024-11486.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7154-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7184-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7184-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7187-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7187-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7186-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7183-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7183-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7169-3 vom 2025-01-07", "url": "https://ubuntu.com/security/notices/USN-7169-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7167-2 vom 2025-01-07", "url": "https://ubuntu.com/security/notices/USN-7167-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7169-4 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7169-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7185-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7185-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7196-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7195-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7186-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7169-5 vom 2025-01-10", "url": "https://ubuntu.com/security/notices/USN-7169-5" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0089-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0090-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020101.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0106-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14", "url": "https://ubuntu.com/security/notices/USN-7195-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0094-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0097-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0105-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0098-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020106.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0100-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0103-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0108-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020111.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0111-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2IXCN5JTEUUWORLKQVOQYQKMHTJ73CSG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0114-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YC7MKFCHLBJHUQM2SLPOGVG4DUWP2J4E/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0112-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VKNKHAJX3LTXNPTXUJXVJL67P2P7Z7YO/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0110-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PLWCG227VUGPKNXHW6FOCW727UUPVLLU/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7173-3 vom 2025-01-15", "url": "https://ubuntu.com/security/notices/USN-7173-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0124-1 vom 2025-01-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0132-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/U2TCRAW6MN33ZU3TBEQGGYRWFSJ6BPOU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0131-1 vom 2025-01-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0123-1 vom 2025-01-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020126.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0136-1 vom 2025-01-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2VG6PE7ZMNWIM7E4TIKCXL4DVBGBXJN5/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0137-1 vom 2025-01-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHBMZ4MND2ONRG4N26VJNJGAZBXMYEDV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0138-1 vom 2025-01-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ET3TDUWYDTZV554NRC7LB5HGM4TCIIGZ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0146-1 vom 2025-01-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C6ANXHEO54VUUFEWI6QYB2M3L2SS7OOW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0172-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020164.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0177-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020162.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0164-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0185-1 vom 2025-01-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020171.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0180-1 vom 2025-01-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020174.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0181-1 vom 2025-01-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-079 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-079.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-078 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-078.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0240-1 vom 2025-01-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCBYAV5OJRXD362FDCZUSIHNHOURONCF/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0239-1 vom 2025-01-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBKJOKHJGUZRHPVCGSRZVBF6ZMI7KJY7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0238-1 vom 2025-01-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNU4IXTEAXCI7QNPC2AVXZICYTGC4XXI/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-090 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-090.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-061 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-061.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0249-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0253-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0246-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0245-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0244-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0254-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020213.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0260-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0264-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0243-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20066 vom 2025-01-28", "url": "https://linux.oracle.com/errata/ELSA-2025-20066.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7237-1 vom 2025-01-28", "url": "https://ubuntu.com/security/notices/USN-7237-1" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14705-1 vom 2025-01-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-198 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-198.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-196 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-196.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-092 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-092.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-195 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-195.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-197 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-197.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2745 vom 2025-02-04", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2745.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1957 vom 2025-02-05", "url": "https://alas.aws.amazon.com/ALAS-2025-1957.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5860 vom 2025-02-08", "url": "https://lists.debian.org/debian-security-announce/2025/msg00023.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20095 vom 2025-02-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20095.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0410-1 vom 2025-02-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0428-1 vom 2025-02-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0426-1 vom 2025-02-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020303.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0440-1 vom 2025-02-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020319.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20100 vom 2025-02-13", "url": "https://linux.oracle.com/errata/ELSA-2025-20100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0462-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CNVHBWUSJZEY34QR6GDPRY55WG3UIDSL/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0476-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VFHWMM4XIDZD22QFLM3OSRWWSFFBUTZM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0494-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6OLOLTOPB2LMYQP5ZEWFA5S443WHFDIQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0486-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XWFV7VUE5TX6GKXVI46R6ZIDRFEXHKUZ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0489-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OCZ53J3OQFQB3VZIF7V6BL32FWNAV3CH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0462-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNVHBWUSJZEY34QR6GDPRY55WG3UIDSL/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0449-1 vom 2025-02-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020322.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0494-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6OLOLTOPB2LMYQP5ZEWFA5S443WHFDIQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0487-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QIBJK3XANPM2U6AEOTGJ27N3L472DCRE/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0455-1 vom 2025-02-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020321.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0452-1 vom 2025-02-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020320.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0465-1 vom 2025-02-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IZBNMZ4JWAINQUJYDC5JJYGAKWUST46Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0499-1 vom 2025-02-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0557-1 vom 2025-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0564-1 vom 2025-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1960 vom 2025-02-19", "url": "https://alas.aws.amazon.com/ALAS-2025-1960.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7276-1 vom 2025-02-19", "url": "https://ubuntu.com/security/notices/USN-7276-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7277-1 vom 2025-02-19", "url": "https://ubuntu.com/security/notices/USN-7277-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7288-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7289-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7291-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7291-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7288-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7293-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7293-1" }, { "category": "external", "summary": "IBM Security Bulletin 7184085 vom 2025-02-25", "url": "https://www.ibm.com/support/pages/node/7184085" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7295-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2759 vom 2025-02-25", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2759.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7294-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-094 vom 2025-02-25", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-094.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-063 vom 2025-02-25", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-063.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7301-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7301-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7294-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7289-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7308-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7294-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7303-2 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7303-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7310-1 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7310-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7311-1 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7311-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4075 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4076 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03", "url": "https://ubuntu.com/security/notices/USN-7294-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7303-3 vom 2025-03-03", "url": "https://ubuntu.com/security/notices/USN-7303-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2270 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:2270" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1912 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:1912" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7333-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7333-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7332-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0784-1 vom 2025-03-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7331-1 vom 2025-03-05", "url": "https://ubuntu.com/security/notices/USN-7331-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-203 vom 2025-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-203.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-204 vom 2025-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-204.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-205 vom 2025-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-205.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-202 vom 2025-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-202.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1961 vom 2025-03-06", "url": "https://alas.aws.amazon.com/ALAS-2025-1961.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2775 vom 2025-03-07", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2775.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20152 vom 2025-03-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20152.html" }, { "category": "external", "summary": "IBM Security Bulletin 7185244 vom 2025-03-10", "url": "https://www.ibm.com/support/pages/node/7185244" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7344-1 vom 2025-03-11", "url": "https://ubuntu.com/security/notices/USN-7344-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7342-1 vom 2025-03-11", "url": "https://ubuntu.com/security/notices/USN-7342-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-2 vom 2025-03-11", "url": "https://ubuntu.com/security/notices/USN-7332-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7332-3 vom 2025-03-13", "url": "https://ubuntu.com/security/notices/USN-7332-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7344-2 vom 2025-03-13", "url": "https://ubuntu.com/security/notices/USN-7344-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-082 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-082.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-083 vom 2025-03-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-083.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1966 vom 2025-03-17", "url": "https://alas.aws.amazon.com/ALAS-2025-1966.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20190 vom 2025-03-21", "url": "https://linux.oracle.com/errata/ELSA-2025-20190.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2800 vom 2025-03-26", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2800.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7386-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7386-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7387-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7385-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7385-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7383-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7383-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7384-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7384-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7383-2 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7383-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7391-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7393-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7392-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7387-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7392-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4102 vom 2025-04-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7384-2 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7384-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7392-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7392-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7401-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7403-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7403-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1114-1 vom 2025-04-02", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GFUVKSUXYRNYGI6ZX3V2THDXSA47UNT/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02", "url": "https://ubuntu.com/security/notices/USN-7407-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1121-1 vom 2025-04-02", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/N43CHCB2GP64EHTUHJOPVKKKNZQRWP2Y/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1119-1 vom 2025-04-02", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SBLYTUS3TCCWSW237VUH6AAY5NVYUZ3T/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1139-1 vom 2025-04-03", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MMCQJLNQTFQY3ASC2RY677DDWALMOJCQ/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7413-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1123-1 vom 2025-04-03", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RBJNUDBE6VPHIDCFIVWE7AFUQ2E2P436/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07", "url": "https://ubuntu.com/security/notices/USN-7421-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7429-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7428-2 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7428-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7429-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7428-1 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7428-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5900 vom 2025-04-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1225-1 vom 2025-04-14", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMQIDOZZ3LRBGKAI3UWUKDCXNJWRXYGY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1213-1 vom 2025-04-14", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/64D5YFJLDESGQOR3OGPOEV5S4M3DYYAU/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1231-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020693.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20271 vom 2025-04-14", "url": "https://linux.oracle.com/errata/ELSA-2025-20271.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1236-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020691.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1254-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020695.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1248-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020697.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1259-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020698.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1260-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5C772I5KLAAUMXFCSPXGHE5ETFPZGIIY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1278-1 vom 2025-04-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020701.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1262-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YQ5OGGLUK4JYNQDMHQJCE7NAM5KWAUQ6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2826 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2826.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1970 vom 2025-04-17", "url": "https://alas.aws.amazon.com/ALAS-2025-1970.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7451-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7453-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7452-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7449-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7450-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7462-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7462-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7449-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7459-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7463-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7461-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7461-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7462-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7462-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7461-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7461-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7458-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5907 vom 2025-04-27", "url": "https://lists.debian.org/debian-security-announce/2025/msg00069.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7459-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7468-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-227 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-227.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-224 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-224.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-100 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-100.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-226 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-226.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-225 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-225.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-228 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-228.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html" }, { "category": "external", "summary": "Kyocera Downloads", "url": "https://www.kyoceradocumentsolutions.us/en/support/downloads.name-L3VzL2VuL3NvZnR3YXJlL0tZT0NFUkFERVZJQ0VNQU5BR0VS.html#tab=application" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7461-3 vom 2025-05-02", "url": "https://ubuntu.com/security/notices/USN-7461-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4509 vom 2025-05-06", "url": "https://access.redhat.com/errata/RHSA-2025:4509" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07", "url": "https://ubuntu.com/security/notices/USN-7496-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12", "url": "https://ubuntu.com/security/notices/USN-7506-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13", "url": "https://ubuntu.com/security/notices/USN-7506-4" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7532 vom 2025-05-14", "url": "https://access.redhat.com/errata/RHSA-2025:7532" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7531 vom 2025-05-14", "url": "https://access.redhat.com/errata/RHSA-2025:7531" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7676 vom 2025-05-15", "url": "https://access.redhat.com/errata/RHSA-2025:7676" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7683 vom 2025-05-16", "url": "https://access.redhat.com/errata/RHSA-2025:7683" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7516-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7514-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7513-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-7531 vom 2025-05-17", "url": "http://linux.oracle.com/errata/ELSA-2025-7531.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7515-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7510-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7511-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7513-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7511-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7512-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7510-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7517-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7518-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7522-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7515-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7516-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7511-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7523-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21", "url": "https://ubuntu.com/security/notices/USN-7517-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21", "url": "https://ubuntu.com/security/notices/USN-7516-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23", "url": "https://ubuntu.com/security/notices/USN-7516-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7524-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7517-3" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7516-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27", "url": "https://ubuntu.com/security/notices/USN-7510-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7510-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7510-8" }, { "category": "external", "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-8" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-9" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-7" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30", "url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20285-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20191-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7553-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04", "url": "https://ubuntu.com/security/notices/USN-7554-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06", "url": "https://ubuntu.com/security/notices/USN-7553-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-6" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01840-1 vom 2025-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021434.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09", "url": "https://ubuntu.com/security/notices/USN-7553-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01853-1 vom 2025-06-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021441.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01869-1 vom 2025-06-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021449.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01873-1 vom 2025-06-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021451.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20372 vom 2025-06-12", "url": "https://linux.oracle.com/errata/ELSA-2025-20372.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20386-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021483.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20388-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021481.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20384-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021485.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01930-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021497.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20381-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021488.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01932-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021501.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20400-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021522.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250613-0011 vom 2025-06-13", "url": "https://security.netapp.com/advisory/NTAP-20250613-0011" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20397-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021525.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-095 vom 2025-06-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-095.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7593-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26", "url": "https://ubuntu.com/security/notices/USN-7602-1" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250627-0002 vom 2025-06-27", "url": "https://security.netapp.com/advisory/NTAP-20250627-0002" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250627-0005 vom 2025-06-27", "url": "https://security.netapp.com/advisory/NTAP-20250627-0005" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01", "url": "https://ubuntu.com/security/notices/USN-7607-1" }, { "category": "external", "summary": "SEM 2025.2.1 release notes vom 2025-07-02", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-3 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7608-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7608-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-1 vom 2025-07-01", "url": "https://ubuntu.com/security/notices/USN-7608-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7607-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-4 vom 2025-07-03", "url": "https://ubuntu.com/security/notices/USN-7608-4" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08", "url": "https://linux.oracle.com/errata/ELSA-2025-20406.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7627-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-5 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7608-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08", "url": "https://ubuntu.com/security/notices/USN-7627-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7607-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0113-1 vom 2025-07-10", "url": "https://ubuntu.com/security/notices/LSN-0113-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-6 vom 2025-07-11", "url": "https://ubuntu.com/security/notices/USN-7608-6" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16", "url": "https://ubuntu.com/security/notices/USN-7640-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7653-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7653-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7651-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7652-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7652-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7651-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-3 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7651-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7651-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-5 vom 2025-07-24", "url": "https://ubuntu.com/security/notices/USN-7651-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-6 vom 2025-07-24", "url": "https://ubuntu.com/security/notices/USN-7651-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25", "url": "https://ubuntu.com/security/notices/USN-7671-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7671-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-7 vom 2025-07-30", "url": "https://ubuntu.com/security/notices/USN-7608-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7684-2 vom 2025-07-31", "url": "https://ubuntu.com/security/notices/USN-7684-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7684-1 vom 2025-07-31", "url": "https://ubuntu.com/security/notices/USN-7684-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7684-3 vom 2025-07-31", "url": "https://ubuntu.com/security/notices/USN-7684-3" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-100 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-100.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-105 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-105.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04", "url": "https://ubuntu.com/security/notices/USN-7671-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-101 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-101.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-106 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-106.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13", "url": "https://ubuntu.com/security/notices/USN-7685-5" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7701-1 vom 2025-08-19", "url": "https://ubuntu.com/security/notices/USN-7701-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7701-2 vom 2025-08-20", "url": "https://ubuntu.com/security/notices/USN-7701-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7701-3 vom 2025-08-21", "url": "https://ubuntu.com/security/notices/USN-7701-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7712-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7711-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-1 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-2 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7712-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-3 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7727-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03", "url": "https://ubuntu.com/security/notices/USN-7737-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15008 vom 2025-09-04", "url": "https://linux.oracle.com/errata/ELSA-2025-15008.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09", "url": "https://linux.oracle.com/errata/ELSA-2025-20551.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03097-1 vom 2025-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022407.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022420.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10", "url": "https://linux.oracle.com/errata/ELSA-2025-20553.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03108-1 vom 2025-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022413.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJXQ5TFHHXOY34RCSJPZ32PXICETJJAT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03130-1 vom 2025-09-10", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OI7XTGACEWQ2UDCZMU7BMJ53EJTK4DLT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03135-1 vom 2025-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022453.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03156-1 vom 2025-09-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSLXEYDHEPXZRRM6QVD2CNPFQE4HV4IH/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03175-1 vom 2025-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022497.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03181-1 vom 2025-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022513.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03186-1 vom 2025-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022508.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03191-1 vom 2025-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022516.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03190-1 vom 2025-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022518.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03209-1 vom 2025-09-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYKN5NGIGIUIQOD7ME5J7EMEHPSJ3AGG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03223-1 vom 2025-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022534.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03226-1 vom 2025-09-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEHWYIR3R7GHFMEAF5GZVX6OYPVERDIJ/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-089 vom 2025-09-16", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-089.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7755-1 vom 2025-09-17", "url": "https://ubuntu.com/security/notices/USN-7755-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20714-1 vom 2025-09-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022558.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7755-2 vom 2025-09-17", "url": "https://ubuntu.com/security/notices/USN-7755-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20711-1 vom 2025-09-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022561.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20703-1 vom 2025-09-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022569.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20698-1 vom 2025-09-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022573.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-09-17T22:00:00.000+00:00", "generator": { "date": "2025-09-18T07:17:02.177+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-3251", "initial_release_date": "2024-10-21T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-21T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-17T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates aufgenommen" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-28T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-02T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE, Red Hat und Oracle Linux aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-01-07T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-08T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-14T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-01-15T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-01-16T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-19T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-20T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-21T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-26T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2025-01-27T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-28T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von openSUSE und SUSE aufgenommen" }, { "date": "2025-02-03T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-04T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-05T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-09T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-02-10T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-02-11T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-12T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-16T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-17T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-19T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-24T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Ubuntu und Amazon aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-04T23:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-05T23:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-03-06T23:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-09T23:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-10T23:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Oracle Linux und IBM aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "67", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-03-12T23:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-03-13T23:00:00.000+00:00", "number": "69", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2025-03-17T23:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-19T23:00:00.000+00:00", "number": "71", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-20T23:00:00.000+00:00", "number": "72", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-03-25T23:00:00.000+00:00", "number": "73", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "74", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "75", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-31T22:00:00.000+00:00", "number": "76", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-02T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-04-07T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-13T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-14T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-04-15T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-16T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-04-21T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-04-23T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-27T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "91", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "92", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-05-01T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-05T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-06T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-12T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "97", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-15T22:00:00.000+00:00", "number": "98", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "99", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2025-05-19T22:00:00.000+00:00", "number": "100", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "101", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "102", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-05-22T22:00:00.000+00:00", "number": "103", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "104", "summary": "Neue Updates von Ubuntu, SUSE und Debian aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "105", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "106", "summary": "Neue Updates von Ubuntu, Debian und Amazon aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "107", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "108", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-05T22:00:00.000+00:00", "number": "109", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "110", "summary": "Neue Updates von Ubuntu, Amazon und SUSE aufgenommen" }, { "date": "2025-06-10T22:00:00.000+00:00", "number": "111", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "112", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2025-06-12T22:00:00.000+00:00", "number": "113", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "114", "summary": "Neue Updates von SUSE und NetApp aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "115", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "116", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2025-06-26T22:00:00.000+00:00", "number": "117", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-29T22:00:00.000+00:00", "number": "118", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2025-07-01T22:00:00.000+00:00", "number": "119", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-03T22:00:00.000+00:00", "number": "120", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "121", "summary": "Neue Updates von Oracle Linux, Ubuntu und SUSE aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "122", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-13T22:00:00.000+00:00", "number": "123", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "124", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "125", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "126", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "127", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "128", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-22T22:00:00.000+00:00", "number": "129", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-23T22:00:00.000+00:00", "number": "130", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-24T22:00:00.000+00:00", "number": "131", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-27T22:00:00.000+00:00", "number": "132", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "133", "summary": "Referenz(en) aufgenommen: EUVD-2025-22875" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "134", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "135", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "136", "summary": "Referenz(en) aufgenommen:" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "137", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "138", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-10T22:00:00.000+00:00", "number": "139", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "140", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-18T22:00:00.000+00:00", "number": "141", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-19T22:00:00.000+00:00", "number": "142", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-20T22:00:00.000+00:00", "number": "143", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "144", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-27T22:00:00.000+00:00", "number": "145", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-28T22:00:00.000+00:00", "number": "146", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "147", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-03T22:00:00.000+00:00", "number": "148", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2025-09-08T22:00:00.000+00:00", "number": "149", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-09-09T22:00:00.000+00:00", "number": "150", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-09-10T22:00:00.000+00:00", "number": "151", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-11T22:00:00.000+00:00", "number": "152", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-14T22:00:00.000+00:00", "number": "153", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-15T22:00:00.000+00:00", "number": "154", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-16T22:00:00.000+00:00", "number": "155", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2025-09-17T22:00:00.000+00:00", "number": "156", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" } ], "status": "final", "version": "156" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Avamar", "product": { "name": "Dell Avamar", "product_id": "T039664", "product_identification_helper": { "cpe": "cpe:/a:dell:avamar:-" } } }, { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Google Container-Optimized OS", "product": { "name": "Google Container-Optimized OS", "product_id": "1607324", "product_identification_helper": { "cpe": "cpe:/o:google:container-optimized_os:-" } } } ], "category": "vendor", "name": "Google" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP11 IF02", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF02", "product_id": "T041397" } }, { "category": "product_version", "name": "7.5.0 UP11 IF02", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11 IF02", "product_id": "T041397-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if02" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "IBM Security Guardium 12.0", "product_id": "T031092", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:12.0" } } } ], "category": "product_name", "name": "Security Guardium" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Kyocera Printer", "product": { "name": "Kyocera Printer", "product_id": "T015471", "product_identification_helper": { "cpe": "cpe:/h:kyocera:printer:-" } } } ], "category": "vendor", "name": "Kyocera" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "Baseboard Management Controller", "product": { "name": "NetApp AFF Baseboard Management Controller", "product_id": "T025086", "product_identification_helper": { "cpe": "cpe:/h:netapp:aff:::baseboard_management_controller" } } } ], "category": "product_name", "name": "AFF" }, { "branches": [ { "category": "product_version", "name": "for VMware vSphere", "product": { "name": "NetApp ActiveIQ Unified Manager for VMware vSphere", "product_id": "T025152", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere" } } } ], "category": "product_name", "name": "ActiveIQ Unified Manager" }, { "branches": [ { "category": "product_version", "name": "Baseboard Management Controller", "product": { "name": "NetApp FAS Baseboard Management Controller", "product_id": "T043535", "product_identification_helper": { "cpe": "cpe:/h:netapp:fas:baseboard_management_controller" } } } ], "category": "product_name", "name": "FAS" }, { "category": "product_name", "name": "NetApp StorageGRID", "product": { "name": "NetApp StorageGRID", "product_id": "920206", "product_identification_helper": { "cpe": "cpe:/a:netapp:storagegrid:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T046484", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T042774", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T042775", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "product_name", "name": "Linux" }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2025.2.1", "product": { "name": "SolarWinds Security Event Manager \u003c2025.2.1", "product_id": "T044986" } }, { "category": "product_version", "name": "2025.2.1", "product": { "name": "SolarWinds Security Event Manager 2025.2.1", "product_id": "T044986-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1" } } } ], "category": "product_name", "name": "Security Event Manager" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10044", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2016-10044" }, { "cve": "CVE-2022-48946", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48946" }, { "cve": "CVE-2022-48947", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48947" }, { "cve": "CVE-2022-48948", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48948" }, { "cve": "CVE-2022-48949", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48949" }, { "cve": "CVE-2022-48950", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48950" }, { "cve": "CVE-2022-48951", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48951" }, { "cve": "CVE-2022-48952", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48952" }, { "cve": "CVE-2022-48953", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48953" }, { "cve": "CVE-2022-48954", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48954" }, { "cve": "CVE-2022-48955", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48955" }, { "cve": "CVE-2022-48956", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48956" }, { "cve": "CVE-2022-48957", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48957" }, { "cve": "CVE-2022-48958", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48958" }, { "cve": "CVE-2022-48959", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48959" }, { "cve": "CVE-2022-48960", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48960" }, { "cve": "CVE-2022-48961", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48961" }, { "cve": "CVE-2022-48962", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48962" }, { "cve": "CVE-2022-48963", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48963" }, { "cve": "CVE-2022-48964", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48964" }, { "cve": "CVE-2022-48965", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48965" }, { "cve": "CVE-2022-48966", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48966" }, { "cve": "CVE-2022-48967", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48967" }, { "cve": "CVE-2022-48968", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48968" }, { "cve": "CVE-2022-48969", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48969" }, { "cve": "CVE-2022-48970", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48970" }, { "cve": "CVE-2022-48971", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48971" }, { "cve": "CVE-2022-48972", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48972" }, { "cve": "CVE-2022-48973", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48973" }, { "cve": "CVE-2022-48974", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48974" }, { "cve": "CVE-2022-48975", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48975" }, { "cve": "CVE-2022-48976", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48976" }, { "cve": "CVE-2022-48977", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48977" }, { "cve": "CVE-2022-48978", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48978" }, { "cve": "CVE-2022-48979", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48979" }, { "cve": "CVE-2022-48980", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48980" }, { "cve": "CVE-2022-48981", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48981" }, { "cve": "CVE-2022-48982", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48982" }, { "cve": "CVE-2022-48983", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48983" }, { "cve": "CVE-2022-48984", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48984" }, { "cve": "CVE-2022-48985", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48985" }, { "cve": "CVE-2022-48986", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48986" }, { "cve": "CVE-2022-48987", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48987" }, { "cve": "CVE-2022-48988", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48988" }, { "cve": "CVE-2022-48989", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48989" }, { "cve": "CVE-2022-48990", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48990" }, { "cve": "CVE-2022-48991", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48991" }, { "cve": "CVE-2022-48992", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48992" }, { "cve": "CVE-2022-48993", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48993" }, { "cve": "CVE-2022-48994", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48994" }, { "cve": "CVE-2022-48995", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48995" }, { "cve": "CVE-2022-48996", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48996" }, { "cve": "CVE-2022-48997", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48997" }, { "cve": "CVE-2022-48998", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48998" }, { "cve": "CVE-2022-48999", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-48999" }, { "cve": "CVE-2022-49000", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49000" }, { "cve": "CVE-2022-49001", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49001" }, { "cve": "CVE-2022-49002", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49002" }, { "cve": "CVE-2022-49003", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49003" }, { "cve": "CVE-2022-49004", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49004" }, { "cve": "CVE-2022-49005", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49005" }, { "cve": "CVE-2022-49006", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49006" }, { "cve": "CVE-2022-49007", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49007" }, { "cve": "CVE-2022-49008", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49008" }, { "cve": "CVE-2022-49009", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49009" }, { "cve": "CVE-2022-49010", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49010" }, { "cve": "CVE-2022-49011", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49011" }, { "cve": "CVE-2022-49012", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49012" }, { "cve": "CVE-2022-49013", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49013" }, { "cve": "CVE-2022-49014", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49014" }, { "cve": "CVE-2022-49015", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49015" }, { "cve": "CVE-2022-49016", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49016" }, { "cve": "CVE-2022-49017", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49017" }, { "cve": "CVE-2022-49018", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49018" }, { "cve": "CVE-2022-49019", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49019" }, { "cve": "CVE-2022-49020", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49020" }, { "cve": "CVE-2022-49021", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49021" }, { "cve": "CVE-2022-49022", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49022" }, { "cve": "CVE-2022-49023", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49023" }, { "cve": "CVE-2022-49024", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49024" }, { "cve": "CVE-2022-49025", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49025" }, { "cve": "CVE-2022-49026", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49026" }, { "cve": "CVE-2022-49027", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49027" }, { "cve": "CVE-2022-49028", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49028" }, { "cve": "CVE-2022-49029", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49029" }, { "cve": "CVE-2022-49030", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49030" }, { "cve": "CVE-2022-49031", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49031" }, { "cve": "CVE-2022-49032", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49032" }, { "cve": "CVE-2022-49033", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2022-49033" }, { "cve": "CVE-2023-52917", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2023-52917" }, { "cve": "CVE-2023-52918", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2023-52918" }, { "cve": "CVE-2023-52919", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2023-52919" }, { "cve": "CVE-2023-6270", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2023-6270" }, { "cve": "CVE-2024-47675", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47675" }, { "cve": "CVE-2024-47676", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47676" }, { "cve": "CVE-2024-47677", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47677" }, { "cve": "CVE-2024-47678", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47678" }, { "cve": "CVE-2024-47679", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47679" }, { "cve": "CVE-2024-47680", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47680" }, { "cve": "CVE-2024-47681", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47681" }, { "cve": "CVE-2024-47682", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47682" }, { "cve": "CVE-2024-47683", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47683" }, { "cve": "CVE-2024-47684", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47684" }, { "cve": "CVE-2024-47685", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47685" }, { "cve": "CVE-2024-47686", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47686" }, { "cve": "CVE-2024-47687", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47687" }, { "cve": "CVE-2024-47688", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47688" }, { "cve": "CVE-2024-47689", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47689" }, { "cve": "CVE-2024-47690", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47690" }, { "cve": "CVE-2024-47691", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47691" }, { "cve": "CVE-2024-47692", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47692" }, { "cve": "CVE-2024-47693", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47693" }, { "cve": "CVE-2024-47694", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47694" }, { "cve": "CVE-2024-47695", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47695" }, { "cve": "CVE-2024-47696", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47696" }, { "cve": "CVE-2024-47697", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47697" }, { "cve": "CVE-2024-47698", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47698" }, { "cve": "CVE-2024-47699", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47699" }, { "cve": "CVE-2024-47700", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47700" }, { "cve": "CVE-2024-47701", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47701" }, { "cve": "CVE-2024-47702", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47702" }, { "cve": "CVE-2024-47703", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47703" }, { "cve": "CVE-2024-47704", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47704" }, { "cve": "CVE-2024-47705", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47705" }, { "cve": "CVE-2024-47706", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47706" }, { "cve": "CVE-2024-47707", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47707" }, { "cve": "CVE-2024-47708", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47708" }, { "cve": "CVE-2024-47709", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47709" }, { "cve": "CVE-2024-47710", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47710" }, { "cve": "CVE-2024-47711", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47711" }, { "cve": "CVE-2024-47712", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47712" }, { "cve": "CVE-2024-47713", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47713" }, { "cve": "CVE-2024-47714", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47714" }, { "cve": "CVE-2024-47715", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47715" }, { "cve": "CVE-2024-47716", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47716" }, { "cve": "CVE-2024-47717", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47717" }, { "cve": "CVE-2024-47718", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47718" }, { "cve": "CVE-2024-47719", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47719" }, { "cve": "CVE-2024-47720", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47720" }, { "cve": "CVE-2024-47721", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47721" }, { "cve": "CVE-2024-47722", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47722" }, { "cve": "CVE-2024-47723", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47723" }, { "cve": "CVE-2024-47724", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47724" }, { "cve": "CVE-2024-47725", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47725" }, { "cve": "CVE-2024-47726", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47726" }, { "cve": "CVE-2024-47727", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47727" }, { "cve": "CVE-2024-47728", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47728" }, { "cve": "CVE-2024-47729", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47729" }, { "cve": "CVE-2024-47730", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47730" }, { "cve": "CVE-2024-47731", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47731" }, { "cve": "CVE-2024-47732", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47732" }, { "cve": "CVE-2024-47733", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47733" }, { "cve": "CVE-2024-47734", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47734" }, { "cve": "CVE-2024-47735", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47735" }, { "cve": "CVE-2024-47736", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47736" }, { "cve": "CVE-2024-47737", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47737" }, { "cve": "CVE-2024-47738", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47738" }, { "cve": "CVE-2024-47739", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47739" }, { "cve": "CVE-2024-47740", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47740" }, { "cve": "CVE-2024-47741", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47741" }, { "cve": "CVE-2024-47742", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47742" }, { "cve": "CVE-2024-47743", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47743" }, { "cve": "CVE-2024-47744", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47744" }, { "cve": "CVE-2024-47745", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47745" }, { "cve": "CVE-2024-47746", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47746" }, { "cve": "CVE-2024-47747", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47747" }, { "cve": "CVE-2024-47748", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47748" }, { "cve": "CVE-2024-47749", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47749" }, { "cve": "CVE-2024-47750", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47750" }, { "cve": "CVE-2024-47751", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47751" }, { "cve": "CVE-2024-47752", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47752" }, { "cve": "CVE-2024-47753", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47753" }, { "cve": "CVE-2024-47754", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47754" }, { "cve": "CVE-2024-47755", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47755" }, { "cve": "CVE-2024-47756", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47756" }, { "cve": "CVE-2024-47757", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-47757" }, { "cve": "CVE-2024-49850", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49850" }, { "cve": "CVE-2024-49851", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49851" }, { "cve": "CVE-2024-49852", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49852" }, { "cve": "CVE-2024-49853", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49853" }, { "cve": "CVE-2024-49854", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49854" }, { "cve": "CVE-2024-49855", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49855" }, { "cve": "CVE-2024-49856", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49856" }, { "cve": "CVE-2024-49857", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49857" }, { "cve": "CVE-2024-49858", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49858" }, { "cve": "CVE-2024-49859", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49859" }, { "cve": "CVE-2024-49860", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49860" }, { "cve": "CVE-2024-49861", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49861" }, { "cve": "CVE-2024-49862", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49862" }, { "cve": "CVE-2024-49863", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49863" }, { "cve": "CVE-2024-49864", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49864" }, { "cve": "CVE-2024-49865", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49865" }, { "cve": "CVE-2024-49866", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49866" }, { "cve": "CVE-2024-49867", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49867" }, { "cve": "CVE-2024-49868", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49868" }, { "cve": "CVE-2024-49869", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49869" }, { "cve": "CVE-2024-49870", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49870" }, { "cve": "CVE-2024-49871", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49871" }, { "cve": "CVE-2024-49872", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49872" }, { "cve": "CVE-2024-49873", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49873" }, { "cve": "CVE-2024-49874", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49874" }, { "cve": "CVE-2024-49875", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49875" }, { "cve": "CVE-2024-49876", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49876" }, { "cve": "CVE-2024-49877", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49877" }, { "cve": "CVE-2024-49878", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49878" }, { "cve": "CVE-2024-49879", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49879" }, { "cve": "CVE-2024-49880", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49880" }, { "cve": "CVE-2024-49881", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49881" }, { "cve": "CVE-2024-49882", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49882" }, { "cve": "CVE-2024-49883", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49883" }, { "cve": "CVE-2024-49884", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49884" }, { "cve": "CVE-2024-49885", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49885" }, { "cve": "CVE-2024-49886", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49886" }, { "cve": "CVE-2024-49887", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49887" }, { "cve": "CVE-2024-49888", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49888" }, { "cve": "CVE-2024-49889", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49889" }, { "cve": "CVE-2024-49890", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49890" }, { "cve": "CVE-2024-49891", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49891" }, { "cve": "CVE-2024-49892", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49892" }, { "cve": "CVE-2024-49893", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49893" }, { "cve": "CVE-2024-49894", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49894" }, { "cve": "CVE-2024-49895", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49895" }, { "cve": "CVE-2024-49896", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49896" }, { "cve": "CVE-2024-49897", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49897" }, { "cve": "CVE-2024-49898", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49898" }, { "cve": "CVE-2024-49899", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49899" }, { "cve": "CVE-2024-49900", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49900" }, { "cve": "CVE-2024-49901", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49901" }, { "cve": "CVE-2024-49902", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49902" }, { "cve": "CVE-2024-49903", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49903" }, { "cve": "CVE-2024-49905", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49905" }, { "cve": "CVE-2024-49906", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49906" }, { "cve": "CVE-2024-49907", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49907" }, { "cve": "CVE-2024-49908", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49908" }, { "cve": "CVE-2024-49909", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49909" }, { "cve": "CVE-2024-49911", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49911" }, { "cve": "CVE-2024-49912", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49912" }, { "cve": "CVE-2024-49913", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49913" }, { "cve": "CVE-2024-49914", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49914" }, { "cve": "CVE-2024-49915", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49915" }, { "cve": "CVE-2024-49916", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49916" }, { "cve": "CVE-2024-49917", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49917" }, { "cve": "CVE-2024-49918", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49918" }, { "cve": "CVE-2024-49919", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49919" }, { "cve": "CVE-2024-49920", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49920" }, { "cve": "CVE-2024-49921", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49921" }, { "cve": "CVE-2024-49922", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49922" }, { "cve": "CVE-2024-49923", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49923" }, { "cve": "CVE-2024-49924", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49924" }, { "cve": "CVE-2024-49925", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49925" }, { "cve": "CVE-2024-49926", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49926" }, { "cve": "CVE-2024-49927", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49927" }, { "cve": "CVE-2024-49928", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49928" }, { "cve": "CVE-2024-49929", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49929" }, { "cve": "CVE-2024-49930", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49930" }, { "cve": "CVE-2024-49931", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49931" }, { "cve": "CVE-2024-49932", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49932" }, { "cve": "CVE-2024-49933", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49933" }, { "cve": "CVE-2024-49934", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49934" }, { "cve": "CVE-2024-49935", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49935" }, { "cve": "CVE-2024-49936", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49936" }, { "cve": "CVE-2024-49937", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49937" }, { "cve": "CVE-2024-49938", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49938" }, { "cve": "CVE-2024-49939", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49939" }, { "cve": "CVE-2024-49940", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49940" }, { "cve": "CVE-2024-49941", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49941" }, { "cve": "CVE-2024-49942", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49942" }, { "cve": "CVE-2024-49943", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49943" }, { "cve": "CVE-2024-49944", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49944" }, { "cve": "CVE-2024-49945", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49945" }, { "cve": "CVE-2024-49946", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49946" }, { "cve": "CVE-2024-49947", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49947" }, { "cve": "CVE-2024-49948", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49948" }, { "cve": "CVE-2024-49949", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49949" }, { "cve": "CVE-2024-49950", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49950" }, { "cve": "CVE-2024-49951", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49951" }, { "cve": "CVE-2024-49952", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49952" }, { "cve": "CVE-2024-49953", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49953" }, { "cve": "CVE-2024-49954", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49954" }, { "cve": "CVE-2024-49955", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49955" }, { "cve": "CVE-2024-49956", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49956" }, { "cve": "CVE-2024-49957", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49957" }, { "cve": "CVE-2024-49958", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49958" }, { "cve": "CVE-2024-49959", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49959" }, { "cve": "CVE-2024-49960", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49960" }, { "cve": "CVE-2024-49961", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49961" }, { "cve": "CVE-2024-49962", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49962" }, { "cve": "CVE-2024-49963", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49963" }, { "cve": "CVE-2024-49964", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49964" }, { "cve": "CVE-2024-49965", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49965" }, { "cve": "CVE-2024-49966", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49966" }, { "cve": "CVE-2024-49967", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49967" }, { "cve": "CVE-2024-49968", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49968" }, { "cve": "CVE-2024-49969", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49969" }, { "cve": "CVE-2024-49970", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49970" }, { "cve": "CVE-2024-49971", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49971" }, { "cve": "CVE-2024-49972", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49972" }, { "cve": "CVE-2024-49973", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49973" }, { "cve": "CVE-2024-49974", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49974" }, { "cve": "CVE-2024-49975", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49975" }, { "cve": "CVE-2024-49976", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49976" }, { "cve": "CVE-2024-49977", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49977" }, { "cve": "CVE-2024-49978", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49978" }, { "cve": "CVE-2024-49979", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49979" }, { "cve": "CVE-2024-49980", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49980" }, { "cve": "CVE-2024-49981", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49981" }, { "cve": "CVE-2024-49982", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49982" }, { "cve": "CVE-2024-49983", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49983" }, { "cve": "CVE-2024-49984", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49984" }, { "cve": "CVE-2024-49985", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49985" }, { "cve": "CVE-2024-49986", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49986" }, { "cve": "CVE-2024-49987", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49987" }, { "cve": "CVE-2024-49988", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49988" }, { "cve": "CVE-2024-49989", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49989" }, { "cve": "CVE-2024-49990", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49990" }, { "cve": "CVE-2024-49991", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49991" }, { "cve": "CVE-2024-49992", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49992" }, { "cve": "CVE-2024-49993", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49993" }, { "cve": "CVE-2024-49994", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49994" }, { "cve": "CVE-2024-49995", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49995" }, { "cve": "CVE-2024-49996", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49996" }, { "cve": "CVE-2024-49997", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49997" }, { "cve": "CVE-2024-49998", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49998" }, { "cve": "CVE-2024-49999", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-49999" }, { "cve": "CVE-2024-50000", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50000" }, { "cve": "CVE-2024-50001", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50001" }, { "cve": "CVE-2024-50002", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50002" }, { "cve": "CVE-2024-50003", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50003" }, { "cve": "CVE-2024-50004", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50004" }, { "cve": "CVE-2024-50005", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50005" }, { "cve": "CVE-2024-50006", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50006" }, { "cve": "CVE-2024-50007", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50007" }, { "cve": "CVE-2024-50008", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50008" }, { "cve": "CVE-2024-50009", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50009" }, { "cve": "CVE-2024-50010", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50010" }, { "cve": "CVE-2024-50011", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50011" }, { "cve": "CVE-2024-50012", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50012" }, { "cve": "CVE-2024-50013", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50013" }, { "cve": "CVE-2024-50014", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50014" }, { "cve": "CVE-2024-50015", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50015" }, { "cve": "CVE-2024-50016", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50016" }, { "cve": "CVE-2024-50017", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50017" }, { "cve": "CVE-2024-50018", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50018" }, { "cve": "CVE-2024-50019", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50019" }, { "cve": "CVE-2024-50020", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50020" }, { "cve": "CVE-2024-50021", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50021" }, { "cve": "CVE-2024-50022", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50022" }, { "cve": "CVE-2024-50023", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50023" }, { "cve": "CVE-2024-50024", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50024" }, { "cve": "CVE-2024-50025", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50025" }, { "cve": "CVE-2024-50026", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50026" }, { "cve": "CVE-2024-50027", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50027" }, { "cve": "CVE-2024-50028", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50028" }, { "cve": "CVE-2024-50029", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50029" }, { "cve": "CVE-2024-50030", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50030" }, { "cve": "CVE-2024-50031", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50031" }, { "cve": "CVE-2024-50032", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50032" }, { "cve": "CVE-2024-50033", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50033" }, { "cve": "CVE-2024-50034", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50034" }, { "cve": "CVE-2024-50035", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50035" }, { "cve": "CVE-2024-50036", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50036" }, { "cve": "CVE-2024-50037", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50037" }, { "cve": "CVE-2024-50038", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50038" }, { "cve": "CVE-2024-50039", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50039" }, { "cve": "CVE-2024-50040", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50040" }, { "cve": "CVE-2024-50041", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50041" }, { "cve": "CVE-2024-50042", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50042" }, { "cve": "CVE-2024-50043", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50043" }, { "cve": "CVE-2024-50044", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50044" }, { "cve": "CVE-2024-50045", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50045" }, { "cve": "CVE-2024-50046", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50046" }, { "cve": "CVE-2024-50047", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50047" }, { "cve": "CVE-2024-50048", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50048" }, { "cve": "CVE-2024-50049", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50049" }, { "cve": "CVE-2024-50055", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50055" }, { "cve": "CVE-2024-50056", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50056" }, { "cve": "CVE-2024-50057", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50057" }, { "cve": "CVE-2024-50058", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50058" }, { "cve": "CVE-2024-50059", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50059" }, { "cve": "CVE-2024-50060", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50060" }, { "cve": "CVE-2024-50061", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50061" }, { "cve": "CVE-2024-50062", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50062" }, { "cve": "CVE-2024-50063", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50063" }, { "cve": "CVE-2024-50064", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50064" }, { "cve": "CVE-2024-50065", "product_status": { "known_affected": [ "T025086", "T025152", "67646", "T034583", "T004914", "T032255", "T039664", "T015471", "T042774", "T044986", "T042775", "2951", "T002207", "T043535", "T000126", "T031092", "T027843", "T046484", "398363", "920206", "1607324", "T041397" ] }, "release_date": "2024-10-21T22:00:00.000+00:00", "title": "CVE-2024-50065" } ] }
ghsa-mm9p-48xr-prf2
Vulnerability from github
The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
{ "affected": [], "aliases": [ "CVE-2016-10044" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-02-07T07:59:00Z", "severity": "HIGH" }, "details": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.", "id": "GHSA-mm9p-48xr-prf2", "modified": "2022-05-17T02:26:55Z", "published": "2022-05-17T02:26:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10044" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "type": "WEB", "url": "http://source.android.com/security/bulletin/2017-02-01.html" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/96122" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1037798" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
cnvd-2017-01391
Vulnerability from cnvd
Title: Google Android内核文件子系统权限提升漏洞
Description:
Android是美国谷歌公司和开放手持设备联盟共同开发的一套以Linux为基础的开源操作系统。
多款Google设备上的Android中的内核文件子系统存在安全漏洞,允许远程攻击者利用漏洞通过特殊的恶意应用程序,提升权限。
Severity: 高
Patch Name: Google Android内核文件子系统权限提升漏洞的补丁
Patch Description:
Android是美国谷歌公司和开放手持设备联盟共同开发的一套以Linux为基础的开源操作系统。
多款Google设备上的Android中的内核文件子系统存在安全漏洞,允许远程攻击者利用漏洞通过特殊的恶意应用程序,提升权限。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://source.android.com/security/bulletin/2017-02-01.html
Reference: http://www.securityfocus.com/bid/96122
Name | ['Google Android One 0', 'Google Pixel C 0', 'Google Nexus Player 0', 'Google Nexus 9', 'Google Nexus 6P', 'Google Nexus 6', 'Google Nexus 5X', 'Google Pixel 0', 'Google Pixel XL 0'] |
---|
{ "bids": { "bid": { "bidNumber": "96122" } }, "cves": { "cve": { "cveNumber": "CVE-2016-10044", "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044" } }, "description": "Android\u662f\u7f8e\u56fd\u8c37\u6b4c\u516c\u53f8\u548c\u5f00\u653e\u624b\u6301\u8bbe\u5907\u8054\u76df\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u4ee5Linux\u4e3a\u57fa\u7840\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\n\u591a\u6b3eGoogle\u8bbe\u5907\u4e0a\u7684Android\u4e2d\u7684\u5185\u6838\u6587\u4ef6\u5b50\u7cfb\u7edf\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7\u7279\u6b8a\u7684\u6076\u610f\u5e94\u7528\u7a0b\u5e8f\uff0c\u63d0\u5347\u6743\u9650\u3002", "discovererName": "Google", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://source.android.com/security/bulletin/2017-02-01.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2017-01391", "openTime": "2017-02-16", "patchDescription": "Android\u662f\u7f8e\u56fd\u8c37\u6b4c\u516c\u53f8\u548c\u5f00\u653e\u624b\u6301\u8bbe\u5907\u8054\u76df\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u4ee5Linux\u4e3a\u57fa\u7840\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\n\u591a\u6b3eGoogle\u8bbe\u5907\u4e0a\u7684Android\u4e2d\u7684\u5185\u6838\u6587\u4ef6\u5b50\u7cfb\u7edf\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7\u7279\u6b8a\u7684\u6076\u610f\u5e94\u7528\u7a0b\u5e8f\uff0c\u63d0\u5347\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Google Android\u5185\u6838\u6587\u4ef6\u5b50\u7cfb\u7edf\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Google Android One 0", "Google Pixel C 0", "Google Nexus Player 0", "Google Nexus 9", "Google Nexus 6P", "Google Nexus 6", "Google Nexus 5X", "Google Pixel 0", "Google Pixel XL 0" ] }, "referenceLink": "http://www.securityfocus.com/bid/96122", "serverity": "\u9ad8", "submitTime": "2017-02-10", "title": "Google Android\u5185\u6838\u6587\u4ef6\u5b50\u7cfb\u7edf\u6743\u9650\u63d0\u5347\u6f0f\u6d1e" }
gsd-2016-10044
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-10044", "description": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.", "id": "GSD-2016-10044", "references": [ "https://www.suse.com/security/cve/CVE-2016-10044.html", "https://ubuntu.com/security/CVE-2016-10044", "https://linux.oracle.com/cve/CVE-2016-10044.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-10044" ], "details": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.", "id": "GSD-2016-10044", "modified": "2023-12-13T01:21:26.497343Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2016-10044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7" }, { "name": "1037798", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037798" }, { "name": "http://source.android.com/security/bulletin/2017-02-01.html", "refsource": "CONFIRM", "url": "http://source.android.com/security/bulletin/2017-02-01.html" }, { "name": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "name": "96122", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96122" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.16.43", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.24", "versionStartIncluding": "3.17", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.7.7", "versionStartIncluding": "4.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2016-10044" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7" }, { "name": "http://source.android.com/security/bulletin/2017-02-01.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://source.android.com/security/bulletin/2017-02-01.html" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "name": "96122", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96122" }, { "name": "1037798", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037798" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-01-17T21:40Z", "publishedDate": "2017-02-07T07:59Z" } } }
suse-su-2017:1247-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).\n- CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enabled scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697).\n- CVE-2016-3070: The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel improperly interacted with mm/migrate.c, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move (bnc#979215).\n- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanages the #BP and #OF exceptions, which allowed guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest (bnc#1015703).\n- CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel did not properly restrict execute access, which made it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call (bnc#1023992).\n- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415).\n- CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel did not properly validate meta block groups, which allowed physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image (bnc#1023377).\n- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003).\n- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914).\n- CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allowed remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access (bnc#1023762).\n- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938).\n- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bnc#1025235).\n- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024).\n- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722).\n- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190).\n- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189).\n- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178).\n- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066).\n- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).\n- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).\n- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).\n- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579).\n- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bnc#1033336).\n\nThe following non-security bugs were fixed:\n\n- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).\n- hwrng: virtio - ensure reads happen after successful probe (bsc#954763 bsc#1032344).\n- kgr/module: make a taint flag module-specific (fate#313296).\n- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).\n- l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).\n- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415).\n- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415).\n- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).\n- l2tp: lock socket before checking flags in connect() (bsc#1028415).\n- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).\n- module: move add_taint_module() to a header file (fate#313296).\n- netfilter: bridge: Fix the build when IPV6 is disabled (bsc#1027149).\n- nfs: flush out dirty data on file fput() (bsc#1021762).\n- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).\n- powerpc: Reject binutils 2.24 when building little endian (boo#1028895).\n- revert \u0027procfs: mark thread stack correctly in proc/\u003cpid\u003e/maps\u0027 (bnc#1030901).\n- taint/module: Clean up global and module taint flags handling (fate#313296).\n- usb: serial: kl5kusb105: fix line-state error handling (bsc#1021256).\n- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).\n- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2017-749,SUSE-SLE-SAP-12-2017-749,SUSE-SLE-SERVER-12-2017-749", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1247-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:1247-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171247-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:1247-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1015703", "url": "https://bugzilla.suse.com/1015703" }, { "category": "self", "summary": "SUSE Bug 1021256", "url": "https://bugzilla.suse.com/1021256" }, { "category": "self", "summary": "SUSE Bug 1021762", "url": "https://bugzilla.suse.com/1021762" }, { "category": "self", "summary": "SUSE Bug 1023377", "url": "https://bugzilla.suse.com/1023377" }, { "category": "self", "summary": "SUSE Bug 1023762", "url": "https://bugzilla.suse.com/1023762" }, { "category": "self", "summary": "SUSE Bug 1023992", "url": "https://bugzilla.suse.com/1023992" }, { "category": "self", "summary": "SUSE Bug 1024938", "url": "https://bugzilla.suse.com/1024938" }, { "category": "self", "summary": "SUSE Bug 1025235", "url": "https://bugzilla.suse.com/1025235" }, { "category": "self", "summary": "SUSE Bug 1026024", "url": "https://bugzilla.suse.com/1026024" }, { "category": "self", "summary": "SUSE Bug 1026722", "url": "https://bugzilla.suse.com/1026722" }, { "category": "self", "summary": "SUSE Bug 1026914", "url": "https://bugzilla.suse.com/1026914" }, { "category": "self", "summary": "SUSE Bug 1027066", "url": "https://bugzilla.suse.com/1027066" }, { "category": "self", "summary": "SUSE Bug 1027149", "url": "https://bugzilla.suse.com/1027149" }, { "category": "self", "summary": "SUSE Bug 1027178", "url": "https://bugzilla.suse.com/1027178" }, { "category": "self", "summary": "SUSE Bug 1027189", "url": "https://bugzilla.suse.com/1027189" }, { "category": "self", "summary": "SUSE Bug 1027190", "url": "https://bugzilla.suse.com/1027190" }, { "category": "self", "summary": "SUSE Bug 1028415", "url": "https://bugzilla.suse.com/1028415" }, { "category": "self", "summary": "SUSE Bug 1028895", "url": "https://bugzilla.suse.com/1028895" }, { "category": "self", "summary": "SUSE Bug 1029986", "url": "https://bugzilla.suse.com/1029986" }, { "category": "self", "summary": "SUSE Bug 1030118", "url": "https://bugzilla.suse.com/1030118" }, { "category": "self", "summary": "SUSE Bug 1030213", "url": "https://bugzilla.suse.com/1030213" }, { "category": "self", "summary": "SUSE Bug 1030901", "url": "https://bugzilla.suse.com/1030901" }, { "category": "self", "summary": "SUSE Bug 1031003", "url": "https://bugzilla.suse.com/1031003" }, { "category": "self", "summary": "SUSE Bug 1031052", "url": "https://bugzilla.suse.com/1031052" }, { "category": "self", "summary": "SUSE Bug 1031440", "url": "https://bugzilla.suse.com/1031440" }, { "category": "self", "summary": "SUSE Bug 1031579", "url": "https://bugzilla.suse.com/1031579" }, { "category": "self", "summary": "SUSE Bug 1032344", "url": "https://bugzilla.suse.com/1032344" }, { "category": "self", "summary": "SUSE Bug 1033336", "url": "https://bugzilla.suse.com/1033336" }, { "category": "self", "summary": "SUSE Bug 914939", "url": "https://bugzilla.suse.com/914939" }, { "category": "self", "summary": "SUSE Bug 954763", "url": "https://bugzilla.suse.com/954763" }, { "category": "self", "summary": "SUSE Bug 968697", "url": "https://bugzilla.suse.com/968697" }, { "category": "self", "summary": "SUSE Bug 979215", "url": "https://bugzilla.suse.com/979215" }, { "category": "self", "summary": "SUSE Bug 983212", "url": "https://bugzilla.suse.com/983212" }, { "category": "self", "summary": "SUSE Bug 989056", "url": "https://bugzilla.suse.com/989056" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1350 page", "url": "https://www.suse.com/security/cve/CVE-2015-1350/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10044 page", "url": "https://www.suse.com/security/cve/CVE-2016-10044/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10200 page", "url": "https://www.suse.com/security/cve/CVE-2016-10200/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10208 page", "url": "https://www.suse.com/security/cve/CVE-2016-10208/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2117 page", "url": "https://www.suse.com/security/cve/CVE-2016-2117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3070 page", "url": "https://www.suse.com/security/cve/CVE-2016-3070/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5243 page", "url": "https://www.suse.com/security/cve/CVE-2016-5243/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9588 page", "url": "https://www.suse.com/security/cve/CVE-2016-9588/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2671 page", "url": "https://www.suse.com/security/cve/CVE-2017-2671/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5669 page", "url": "https://www.suse.com/security/cve/CVE-2017-5669/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5897 page", "url": "https://www.suse.com/security/cve/CVE-2017-5897/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5970 page", "url": "https://www.suse.com/security/cve/CVE-2017-5970/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5986 page", "url": "https://www.suse.com/security/cve/CVE-2017-5986/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6074 page", "url": "https://www.suse.com/security/cve/CVE-2017-6074/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6214 page", "url": "https://www.suse.com/security/cve/CVE-2017-6214/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6345 page", "url": "https://www.suse.com/security/cve/CVE-2017-6345/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6346 page", "url": "https://www.suse.com/security/cve/CVE-2017-6346/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6348 page", "url": "https://www.suse.com/security/cve/CVE-2017-6348/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6353 page", "url": "https://www.suse.com/security/cve/CVE-2017-6353/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7187 page", "url": "https://www.suse.com/security/cve/CVE-2017-7187/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7261 page", "url": "https://www.suse.com/security/cve/CVE-2017-7261/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7294 page", "url": "https://www.suse.com/security/cve/CVE-2017-7294/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7308 page", "url": "https://www.suse.com/security/cve/CVE-2017-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7616 page", "url": "https://www.suse.com/security/cve/CVE-2017-7616/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-05-11T14:24:14Z", "generator": { "date": "2017-05-11T14:24:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:1247-1", "initial_release_date": "2017-05-11T14:24:14Z", "revision_history": [ { "date": "2017-05-11T14:24:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.61-52.72.1.noarch", "product": { "name": "kernel-devel-3.12.61-52.72.1.noarch", "product_id": "kernel-devel-3.12.61-52.72.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.61-52.72.1.noarch", "product": { "name": "kernel-macros-3.12.61-52.72.1.noarch", "product_id": "kernel-macros-3.12.61-52.72.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.61-52.72.1.noarch", "product": { "name": "kernel-source-3.12.61-52.72.1.noarch", "product_id": "kernel-source-3.12.61-52.72.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.72.1.ppc64le", "product": { "name": "kernel-default-3.12.61-52.72.1.ppc64le", "product_id": "kernel-default-3.12.61-52.72.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.72.1.ppc64le", "product": { "name": "kernel-default-base-3.12.61-52.72.1.ppc64le", "product_id": "kernel-default-base-3.12.61-52.72.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.72.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.61-52.72.1.ppc64le", "product_id": "kernel-default-devel-3.12.61-52.72.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.72.1.ppc64le", "product": { "name": "kernel-syms-3.12.61-52.72.1.ppc64le", "product_id": "kernel-syms-3.12.61-52.72.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.72.1.s390x", "product": { "name": "kernel-default-3.12.61-52.72.1.s390x", "product_id": "kernel-default-3.12.61-52.72.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.72.1.s390x", "product": { "name": "kernel-default-base-3.12.61-52.72.1.s390x", "product_id": "kernel-default-base-3.12.61-52.72.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.72.1.s390x", "product": { "name": "kernel-default-devel-3.12.61-52.72.1.s390x", "product_id": "kernel-default-devel-3.12.61-52.72.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.61-52.72.1.s390x", "product": { "name": "kernel-default-man-3.12.61-52.72.1.s390x", "product_id": "kernel-default-man-3.12.61-52.72.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.72.1.s390x", "product": { "name": "kernel-syms-3.12.61-52.72.1.s390x", "product_id": "kernel-syms-3.12.61-52.72.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.61-52.72.1.x86_64", "product": { "name": "kernel-ec2-3.12.61-52.72.1.x86_64", "product_id": "kernel-ec2-3.12.61-52.72.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.61-52.72.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.61-52.72.1.x86_64", "product_id": "kernel-ec2-devel-3.12.61-52.72.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.61-52.72.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.61-52.72.1.x86_64", "product_id": "kernel-ec2-extra-3.12.61-52.72.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.61-52.72.1.x86_64", "product": { "name": "kernel-default-3.12.61-52.72.1.x86_64", "product_id": "kernel-default-3.12.61-52.72.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.72.1.x86_64", "product": { "name": "kernel-default-base-3.12.61-52.72.1.x86_64", "product_id": "kernel-default-base-3.12.61-52.72.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.72.1.x86_64", "product": { "name": "kernel-default-devel-3.12.61-52.72.1.x86_64", "product_id": "kernel-default-devel-3.12.61-52.72.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.72.1.x86_64", "product": { "name": "kernel-syms-3.12.61-52.72.1.x86_64", "product_id": "kernel-syms-3.12.61-52.72.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.61-52.72.1.x86_64", "product": { "name": "kernel-xen-3.12.61-52.72.1.x86_64", "product_id": "kernel-xen-3.12.61-52.72.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.61-52.72.1.x86_64", "product": { "name": "kernel-xen-base-3.12.61-52.72.1.x86_64", "product_id": "kernel-xen-base-3.12.61-52.72.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.61-52.72.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.61-52.72.1.x86_64", "product_id": "kernel-xen-devel-3.12.61-52.72.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-ec2-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.72.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.72.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.72.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.72.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le" }, "product_reference": "kernel-default-3.12.61-52.72.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.72.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x" }, "product_reference": "kernel-default-3.12.61-52.72.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.72.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.61-52.72.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.72.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x" }, "product_reference": "kernel-default-base-3.12.61-52.72.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.72.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.61-52.72.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.72.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x" }, "product_reference": "kernel-default-devel-3.12.61-52.72.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.61-52.72.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x" }, "product_reference": "kernel-default-man-3.12.61-52.72.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.72.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.72.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.72.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.72.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.72.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le" }, "product_reference": "kernel-syms-3.12.61-52.72.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.72.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x" }, "product_reference": "kernel-syms-3.12.61-52.72.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.72.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.72.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1350" } ], "notes": [ { "category": "general", "text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1350", "url": "https://www.suse.com/security/cve/CVE-2015-1350" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-1350", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 914939 for CVE-2015-1350", "url": "https://bugzilla.suse.com/914939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2015-1350" }, { "cve": "CVE-2016-10044", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10044" } ], "notes": [ { "category": "general", "text": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10044", "url": "https://www.suse.com/security/cve/CVE-2016-10044" }, { "category": "external", "summary": "SUSE Bug 1023992 for CVE-2016-10044", "url": "https://bugzilla.suse.com/1023992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "low" } ], "title": "CVE-2016-10044" }, { "cve": "CVE-2016-10200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10200" } ], "notes": [ { "category": "general", "text": "Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10200", "url": "https://www.suse.com/security/cve/CVE-2016-10200" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-10200", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1028415 for CVE-2016-10200", "url": "https://bugzilla.suse.com/1028415" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "low" } ], "title": "CVE-2016-10200" }, { "cve": "CVE-2016-10208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10208" } ], "notes": [ { "category": "general", "text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10208", "url": "https://www.suse.com/security/cve/CVE-2016-10208" }, { "category": "external", "summary": "SUSE Bug 1023377 for CVE-2016-10208", "url": "https://bugzilla.suse.com/1023377" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2016-10208", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "important" } ], "title": "CVE-2016-10208" }, { "cve": "CVE-2016-2117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2117" } ], "notes": [ { "category": "general", "text": "The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2117", "url": "https://www.suse.com/security/cve/CVE-2016-2117" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-2117", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 968697 for CVE-2016-2117", "url": "https://bugzilla.suse.com/968697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "important" } ], "title": "CVE-2016-2117" }, { "cve": "CVE-2016-3070", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3070" } ], "notes": [ { "category": "general", "text": "The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3070", "url": "https://www.suse.com/security/cve/CVE-2016-3070" }, { "category": "external", "summary": "SUSE Bug 979215 for CVE-2016-3070", "url": "https://bugzilla.suse.com/979215" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "low" } ], "title": "CVE-2016-3070" }, { "cve": "CVE-2016-5243", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5243" } ], "notes": [ { "category": "general", "text": "The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5243", "url": "https://www.suse.com/security/cve/CVE-2016-5243" }, { "category": "external", "summary": "SUSE Bug 983212 for CVE-2016-5243", "url": "https://bugzilla.suse.com/983212" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5243", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "low" } ], "title": "CVE-2016-5243" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-9588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9588" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9588", "url": "https://www.suse.com/security/cve/CVE-2016-9588" }, { "category": "external", "summary": "SUSE Bug 1015703 for CVE-2016-9588", "url": "https://bugzilla.suse.com/1015703" }, { "category": "external", "summary": "SUSE Bug 1017512 for CVE-2016-9588", "url": "https://bugzilla.suse.com/1017512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2016-9588" }, { "cve": "CVE-2017-2671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2671" } ], "notes": [ { "category": "general", "text": "The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2671", "url": "https://www.suse.com/security/cve/CVE-2017-2671" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031003 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1031003" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "important" } ], "title": "CVE-2017-2671" }, { "cve": "CVE-2017-5669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5669" } ], "notes": [ { "category": "general", "text": "The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5669", "url": "https://www.suse.com/security/cve/CVE-2017-5669" }, { "category": "external", "summary": "SUSE Bug 1026914 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1026914" }, { "category": "external", "summary": "SUSE Bug 1102390 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1102390" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2017-5669" }, { "cve": "CVE-2017-5897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5897" } ], "notes": [ { "category": "general", "text": "The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5897", "url": "https://www.suse.com/security/cve/CVE-2017-5897" }, { "category": "external", "summary": "SUSE Bug 1023762 for CVE-2017-5897", "url": "https://bugzilla.suse.com/1023762" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-5897", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2017-5897" }, { "cve": "CVE-2017-5970", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5970" } ], "notes": [ { "category": "general", "text": "The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5970", "url": "https://www.suse.com/security/cve/CVE-2017-5970" }, { "category": "external", "summary": "SUSE Bug 1024938 for CVE-2017-5970", "url": "https://bugzilla.suse.com/1024938" }, { "category": "external", "summary": "SUSE Bug 1025013 for CVE-2017-5970", "url": "https://bugzilla.suse.com/1025013" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-5970", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "important" } ], "title": "CVE-2017-5970" }, { "cve": "CVE-2017-5986", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5986" } ], "notes": [ { "category": "general", "text": "Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5986", "url": "https://www.suse.com/security/cve/CVE-2017-5986" }, { "category": "external", "summary": "SUSE Bug 1025235 for CVE-2017-5986", "url": "https://bugzilla.suse.com/1025235" }, { "category": "external", "summary": "SUSE Bug 1027066 for CVE-2017-5986", "url": "https://bugzilla.suse.com/1027066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2017-5986" }, { "cve": "CVE-2017-6074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6074" } ], "notes": [ { "category": "general", "text": "The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6074", "url": "https://www.suse.com/security/cve/CVE-2017-6074" }, { "category": "external", "summary": "SUSE Bug 1026024 for CVE-2017-6074", "url": "https://bugzilla.suse.com/1026024" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2017-6074", "url": "https://bugzilla.suse.com/1072204" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "important" } ], "title": "CVE-2017-6074" }, { "cve": "CVE-2017-6214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6214" } ], "notes": [ { "category": "general", "text": "The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6214", "url": "https://www.suse.com/security/cve/CVE-2017-6214" }, { "category": "external", "summary": "SUSE Bug 1026722 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1026722" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2017-6214" }, { "cve": "CVE-2017-6345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6345" } ], "notes": [ { "category": "general", "text": "The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6345", "url": "https://www.suse.com/security/cve/CVE-2017-6345" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1027190 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1027190" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2017-6345" }, { "cve": "CVE-2017-6346", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6346" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6346", "url": "https://www.suse.com/security/cve/CVE-2017-6346" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1027189 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1027189" }, { "category": "external", "summary": "SUSE Bug 1064388 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1064388" }, { "category": "external", "summary": "SUSE Bug 1064392 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1064392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "low" } ], "title": "CVE-2017-6346" }, { "cve": "CVE-2017-6348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6348" } ], "notes": [ { "category": "general", "text": "The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6348", "url": "https://www.suse.com/security/cve/CVE-2017-6348" }, { "category": "external", "summary": "SUSE Bug 1027178 for CVE-2017-6348", "url": "https://bugzilla.suse.com/1027178" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-6348", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2017-6348" }, { "cve": "CVE-2017-6353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6353" } ], "notes": [ { "category": "general", "text": "net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6353", "url": "https://www.suse.com/security/cve/CVE-2017-6353" }, { "category": "external", "summary": "SUSE Bug 1025235 for CVE-2017-6353", "url": "https://bugzilla.suse.com/1025235" }, { "category": "external", "summary": "SUSE Bug 1027066 for CVE-2017-6353", "url": "https://bugzilla.suse.com/1027066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2017-6353" }, { "cve": "CVE-2017-7187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7187" } ], "notes": [ { "category": "general", "text": "The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7187", "url": "https://www.suse.com/security/cve/CVE-2017-7187" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1030213 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1030213" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2017-7187" }, { "cve": "CVE-2017-7261", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7261" } ], "notes": [ { "category": "general", "text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7261", "url": "https://www.suse.com/security/cve/CVE-2017-7261" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7261", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031052 for CVE-2017-7261", "url": "https://bugzilla.suse.com/1031052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2017-7261" }, { "cve": "CVE-2017-7294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7294" } ], "notes": [ { "category": "general", "text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7294", "url": "https://www.suse.com/security/cve/CVE-2017-7294" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031440 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1031440" }, { "category": "external", "summary": "SUSE Bug 1031481 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1031481" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2017-7294" }, { "cve": "CVE-2017-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7308" } ], "notes": [ { "category": "general", "text": "The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7308", "url": "https://www.suse.com/security/cve/CVE-2017-7308" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031579 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1031579" }, { "category": "external", "summary": "SUSE Bug 1031660 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1031660" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "moderate" } ], "title": "CVE-2017-7308" }, { "cve": "CVE-2017-7616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7616" } ], "notes": [ { "category": "general", "text": "Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7616", "url": "https://www.suse.com/security/cve/CVE-2017-7616" }, { "category": "external", "summary": "SUSE Bug 1033336 for CVE-2017-7616", "url": "https://bugzilla.suse.com/1033336" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.72.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.72.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-11T14:24:14Z", "details": "low" } ], "title": "CVE-2017-7616" } ] }
suse-su-2017:1360-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive various security and bugfixes.\n\nNotable new/improved features:\n- Improved support for Hyper-V\n- Support for the tcp_westwood TCP scheduling algorithm\n\nThe following security bugs were fixed:\n\n- CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel allowed privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer (bsc#1035877).\n- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the \u0027dead\u0027 type. (bsc#1029850).\n- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c. (bsc#1030593)\n- CVE-2016-9604: This fixes handling of keyrings starting with \u0027.\u0027 in KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to manipulate privileged keyrings (bsc#1035576)\n- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation. (bnc#1033336).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670).\n- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)\n- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)\n- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)\n- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)\n- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)\n- CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanaged the #BP and #OF exceptions, which allowed guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest (bsc#1015703).\n- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914).\n- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)\n- CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel did not properly validate meta block groups, which allowed physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image (bnc#1023377).\n- CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allowed remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access (bsc#1023762).\n- CVE-2017-5986: A race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235).\n- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)\n- CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application (bnc#1008842)\n- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178).\n- CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel did not properly restrict execute access, which made it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call (bnc#1023992).\n- CVE-2016-3070: The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel improperly interacts with mm/migrate.c, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move (bnc#979215).\n- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212).\n- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190)\n- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189)\n- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066)\n- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235).\n- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)\n- CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697)\n- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bsc#914939).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003077).\n\nThe following non-security bugs were fixed:\n\n- ACPI / APEI: Fix NMI notification handling (bsc#917630).\n- arch: Mass conversion of smp_mb__*() (bsc#1020795).\n- asm-generic: add __smp_xxx wrappers (bsc#1020795).\n- block: remove struct request buffer member (bsc#1020795).\n- block: submit_bio_wait() conversions (bsc#1020795).\n- bonding: Advertize vxlan offload features when supported (bsc#1009682).\n- bonding: handle more gso types (bsc#1009682).\n- bonding: use the correct ether type for alb (bsc#1028595).\n- btrfs: allow unlink to exceed subvolume quota (bsc#1015821).\n- btrfs: Change qgroup_meta_rsv to 64bit (bsc#1015821).\n- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).\n- btrfs: make file clone aware of fatal signals (bsc#1015787).\n- btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1015821).\n- cancel the setfilesize transation when io error happen (bsc#1028648).\n- cgroup: remove stray references to css_id (bsc#1020795).\n- cpuidle: powernv/pseries: Auto-promotion of snooze to deeper idle state (bnc#1023164).\n- dm: add era target (bsc#1020795).\n- dm: allow remove to be deferred (bsc#1020795).\n- dm bitset: only flush the current word if it has been dirtied (bsc#1020795).\n- dm btree: add dm_btree_find_lowest_key (bsc#1020795).\n- dm cache: actually resize cache (bsc#1020795).\n- dm cache: add block sizes and total cache blocks to status output (bsc#1020795).\n- dm cache: add cache block invalidation support (bsc#1020795).\n- dm cache: add passthrough mode (bsc#1020795).\n- dm cache: add policy name to status output (bsc#1020795).\n- dm cache: add remove_cblock method to policy interface (bsc#1020795).\n- dm cache: be much more aggressive about promoting writes to discarded blocks (bsc#1020795).\n- dm cache: cache shrinking support (bsc#1020795).\n- dm cache: do not add migration to completed list before unhooking bio (bsc#1020795).\n- dm cache: fix a lock-inversion (bsc#1020795).\n- dm cache: fix truncation bug when mapping I/O to more than 2TB fast device (bsc#1020795).\n- dm cache: fix writethrough mode quiescing in cache_map (bsc#1020795).\n- dm cache: improve efficiency of quiescing flag management (bsc#1020795).\n- dm cache: io destined for the cache device can now serve as tick bios (bsc#1020795).\n- dm cache: log error message if dm_kcopyd_copy() fails (bsc#1020795).\n- dm cache metadata: check the metadata version when reading the superblock (bsc#1020795).\n- dm cache metadata: return bool from __superblock_all_zeroes (bsc#1020795).\n- dm cache: move hook_info into common portion of per_bio_data structure (bsc#1020795).\n- dm cache: optimize commit_if_needed (bsc#1020795).\n- dm cache policy mq: a few small fixes (bsc#1020795).\n- dm cache policy mq: fix promotions to occur as expected (bsc#1020795).\n- dm cache policy mq: implement writeback_work() and mq_{set,clear}_dirty() (bsc#1020795).\n- dm cache policy mq: introduce three promotion threshold tunables (bsc#1020795).\n- dm cache policy mq: protect residency method with existing mutex (bsc#1020795).\n- dm cache policy mq: reduce memory requirements (bsc#1020795).\n- dm cache policy mq: use list_del_init instead of list_del + INIT_LIST_HEAD (bsc#1020795).\n- dm cache policy: remove return from void policy_remove_mapping (bsc#1020795).\n- dm cache: promotion optimisation for writes (bsc#1020795).\n- dm cache: resolve small nits and improve Documentation (bsc#1020795).\n- dm cache: return -EINVAL if the user specifies unknown cache policy (bsc#1020795).\n- dm cache: use cell_defer() boolean argument consistently (bsc#1020795).\n- dm: change sector_count member in clone_info from sector_t to unsigned (bsc#1020795).\n- dm crypt: add TCW IV mode for old CBC TCRYPT containers (bsc#1020795).\n- dm crypt: properly handle extra key string in initialization (bsc#1020795).\n- dm delay: use per-bio data instead of a mempool and slab cache (bsc#1020795).\n- dm: fix Kconfig indentation (bsc#1020795).\n- dm: fix Kconfig menu indentation (bsc#1020795).\n- dm: make dm_table_alloc_md_mempools static (bsc#1020795).\n- dm mpath: do not call pg_init when it is already running (bsc#1020795).\n- dm mpath: fix lock order inconsistency in multipath_ioctl (bsc#1020795).\n- dm mpath: print more useful warnings in multipath_message() (bsc#1020795).\n- dm mpath: push back requests instead of queueing (bsc#1020795).\n- dm mpath: really fix lockdep warning (bsc#1020795).\n- dm mpath: reduce memory pressure when requeuing (bsc#1020795).\n- dm mpath: remove extra nesting in map function (bsc#1020795).\n- dm mpath: remove map_io() (bsc#1020795).\n- dm mpath: remove process_queued_ios() (bsc#1020795).\n- dm mpath: requeue I/O during pg_init (bsc#1020795).\n- dm persistent data: cleanup dm-thin specific references in text (bsc#1020795).\n- dm snapshot: call destroy_work_on_stack() to pair with INIT_WORK_ONSTACK() (bsc#1020795).\n- dm snapshot: fix metadata corruption (bsc#1020795).\n- dm snapshot: prepare for switch to using dm-bufio (bsc#1020795).\n- dm snapshot: use dm-bufio (bsc#1020795).\n- dm snapshot: use dm-bufio prefetch (bsc#1020795).\n- dm snapshot: use GFP_KERNEL when initializing exceptions (bsc#1020795).\n- dm space map disk: optimise sm_disk_dec_block (bsc#1020795).\n- dm space map metadata: limit errors in sm_metadata_new_block (bsc#1020795).\n- dm: stop using bi_private (bsc#1020795).\n- dm table: add dm_table_run_md_queue_async (bsc#1020795).\n- dm table: print error on preresume failure (bsc#1020795).\n- dm table: remove unused buggy code that extends the targets array (bsc#1020795).\n- dm thin: add error_if_no_space feature (bsc#1020795).\n- dm thin: add mappings to end of prepared_* lists (bsc#1020795).\n- dm thin: add \u0027no_space_timeout\u0027 dm-thin-pool module param (bsc#1020795).\n- dm thin: add timeout to stop out-of-data-space mode holding IO forever (bsc#1020795).\n- dm thin: allow metadata commit if pool is in PM_OUT_OF_DATA_SPACE mode (bsc#1020795).\n- dm thin: allow metadata space larger than supported to go unused (bsc#1020795).\n- dm thin: cleanup and improve no space handling (bsc#1020795).\n- dm thin: eliminate the no_free_space flag (bsc#1020795).\n- dm thin: ensure user takes action to validate data and metadata consistency (bsc#1020795).\n- dm thin: factor out check_low_water_mark and use bools (bsc#1020795).\n- dm thin: fix deadlock in __requeue_bio_list (bsc#1020795).\n- dm thin: fix noflush suspend IO queueing (bsc#1020795).\n- dm thin: fix out of data space handling (bsc#1020795).\n- dm thin: fix pool feature parsing (bsc#1020795).\n- dm thin: fix rcu_read_lock being held in code that can sleep (bsc#1020795).\n- dm thin: handle metadata failures more consistently (bsc#1020795).\n- dm thin: irqsave must always be used with the pool-\u003elock spinlock (bsc#1020795).\n- dm thin: log info when growing the data or metadata device (bsc#1020795).\n- dm thin: requeue bios to DM core if no_free_space and in read-only mode (bsc#1020795).\n- dm thin: return error from alloc_data_block if pool is not in write mode (bsc#1020795).\n- dm thin: simplify pool_is_congested (bsc#1020795).\n- dm thin: sort the per thin deferred bios using an rb_tree (bsc#1020795).\n- dm thin: synchronize the pool mode during suspend (bsc#1020795).\n- dm thin: use bool rather than unsigned for flags in structures (bsc#1020795).\n- dm thin: use INIT_WORK_ONSTACK in noflush_work to avoid ODEBUG warning (bsc#1020795).\n- dm thin: use per thin device deferred bio lists (bsc#1020795).\n- dm: use RCU_INIT_POINTER instead of rcu_assign_pointer in __unbind (bsc#1020795).\n- drm/i915: relax uncritical udelay_range() (bsc#1038261).\n- ether: add loopback type ETH_P_LOOPBACK (bsc#1028595).\n- ext4: fix bh leak on error paths in ext4_rename() and ext4_cross_rename() (bsc#1012985).\n- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).\n- ext4: mark inode dirty after converting inline directory (bsc#1012985).\n- ftrace: Make ftrace_location_range() global (FATE#322421).\n- HID: usbhid: improve handling of Clear-Halt and reset (bsc#1031080).\n- hv: util: catch allocation errors\n- hv: utils: use memdup_user in hvt_op_write\n- hwrng: virtio - ensure reads happen after successful probe (bsc#954763 bsc#1032344).\n- i40e: avoid null pointer dereference (bsc#922853).\n- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561).\n- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).\n- i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).\n- i40e: Impose a lower limit on gso size (bsc#985561).\n- i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).\n- iommu/vt-d: Flush old iommu caches for kdump when the device gets context mapped (bsc#1023824).\n- iommu/vt-d: Tylersburg isoch identity map check is done too late (bsc#1032125).\n- ipv6: make ECMP route replacement less greedy (bsc#930399).\n- kabi: hide changes in struct sk_buff (bsc#1009682).\n- KABI: Hide new include in arch/powerpc/kernel/process.c (fate#322421).\n- kABI: mask struct xfs_icdinode change (bsc#1024788).\n- kABI: protect struct inet6_dev (kabi).\n- kABI: protect struct iscsi_conn (bsc#103470).\n- kABI: protect struct xfs_buftarg and struct xfs_mount (bsc#1024508).\n- kABI: restore can_rx_register parameters (kabi).\n- kernel/watchdog: use nmi registers snapshot in hardlockup handler (bsc#940946, bsc#937444).\n- kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).\n- kgr/module: make a taint flag module-specific\n- kgr: remove unneeded kgr_needs_lazy_migration() s390x definition\n- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).\n- l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).\n- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415).\n- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415).\n- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).\n- l2tp: lock socket before checking flags in connect() (bsc#1028415).\n- livepatch: Allow architectures to specify an alternate ftrace location (FATE#322421).\n- locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).\n- md: avoid oops on unload if some process is in poll or select (bsc#1020795).\n- md: Convert use of typedef ctl_table to struct ctl_table (bsc#1020795).\n- md: ensure metadata is writen after raid level change (bsc#1020795).\n- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).\n- md: md_clear_badblocks should return an error code on failure (bsc#1020795).\n- md: refuse to change shape of array if it is active but read-only (bsc#1020795).\n- megaraid_sas: add missing curly braces in ioctl handler (bsc#1023207).\n- megaraid_sas: Fixup tgtid count in megasas_ld_list_query() (bsc#971933).\n- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).\n- mm, memcg: do not retry precharge charges (bnc#1022559).\n- mm/mempolicy.c: do not put mempolicy before using its nodemask (References: VM Performance, bnc#931620).\n- mm/page_alloc: fix nodes for reclaim in fast path (bnc#1031842).\n- module: move add_taint_module() to a header file\n- net: Add skb_gro_postpull_rcsum to udp and vxlan (bsc#1009682).\n- net: add skb_pop_rcv_encapsulation (bsc#1009682).\n- net: Call skb_checksum_init in IPv4 (bsc#1009682).\n- net: Call skb_checksum_init in IPv6 (bsc#1009682).\n- netfilter: allow logging fron non-init netns (bsc#970083).\n- net: Generalize checksum_init functions (bsc#1009682).\n- net: Preserve CHECKSUM_COMPLETE at validation (bsc#1009682).\n- NFS: do not try to cross a mountpount when there isn\u0027t one there (bsc#1028041).\n- NFS: Expedite unmount of NFS auto-mounts (bnc#1025802).\n- NFS: Fix a performance regression in readdir (bsc#857926).\n- NFS: flush out dirty data on file fput() (bsc#1021762).\n- ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1012985).\n- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).\n- powerpc: Create a helper for getting the kernel toc value (FATE#322421).\n- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).\n- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).\n- powerpc/fadump: Update fadump documentation (bsc#1032141).\n- powerpc/ftrace: Add Kconfig \u0026 Make glue for mprofile-kernel (FATE#322421).\n- powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI (FATE#322421).\n- powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace (FATE#322421).\n- powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).\n- powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).\n- powerpc/kgraft: Add kgraft header (FATE#322421).\n- powerpc/kgraft: Add kgraft stack to struct thread_info (FATE#322421).\n- powerpc/kgraft: Add live patching support on ppc64le (FATE#322421).\n- powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).\n- powerpc/module: Mark module stubs with a magic value (FATE#322421).\n- powerpc/module: Only try to generate the ftrace_caller() stub once (FATE#322421).\n- powerpc/modules: Never restore r2 for a mprofile-kernel style mcount() call (FATE#322421).\n- powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530).\n- powerpc/pseries/cpuidle: Remove MAX_IDLE_STATE macro (bnc#1023164).\n- powerpc/pseries/cpuidle: Use cpuidle_register() for initialisation (bnc#1023164).\n- powerpc: Reject binutils 2.24 when building little endian (boo#1028895).\n- RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#982783,bsc#1020048).\n- raid1: include bio_end_io_list in nr_queued to prevent freeze_array hang\n- remove mpath patches from dmcache backport, for bsc#1035738\n- revert \u0027procfs: mark thread stack correctly in proc/PID/maps\u0027 (bnc#1030901).\n- Revert \u0027RDMA/core: Fix incorrect structure packing for booleans\u0027 (kabi).\n- rtnetlink: allow to register ops without ops-\u003esetup set (bsc#1021374).\n- s390/zcrypt: Introduce CEX6 toleration (FATE#321783, LTC#147506, bsc#1019514).\n- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419).\n- scsi_error: count medium access timeout only once per EH run (bsc#993832, bsc#1032345).\n- scsi: libiscsi: add lock around task lists to fix list corruption regression (bsc#1034700).\n- scsi: storvsc: fix SRB_STATUS_ABORTED handling\n- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).\n- svcrpc: fix gss-proxy NULL dereference in some error cases (bsc#1024309).\n- taint/module: Clean up global and module taint flags handling\n- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).\n- thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).\n- thp: reduce indentation level in change_huge_pmd() (bnc#1027974).\n- treewide: fix \u0027distingush\u0027 typo (bsc#1020795).\n- tree-wide: use reinit_completion instead of INIT_COMPLETION (bsc#1020795).\n- usb: dwc3: gadget: Fix incorrect DEPCMD and DGCMD status macros (bsc#1035699).\n- usb: host: xhci: print correct command ring address (bnc#1035699).\n- USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).\n- vfs: Do not exchange \u0027short\u0027 filenames unconditionally (bsc#1012985).\n- vfs: split generic splice code from i_mutex locking (bsc#1024788).\n- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).\n- VSOCK: Detach QP check should filter out non matching QPs (bsc#1036752).\n- vxlan: cancel sock_work in vxlan_dellink() (bsc#1031567).\n- vxlan: Checksum fixes (bsc#1009682).\n- vxlan: GRO support at tunnel layer (bsc#1009682).\n- xen-blkfront: correct maximum segment accounting (bsc#1018263).\n- xen-blkfront: do not call talk_to_blkback when already connected to blkback.\n- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.\n- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).\n- xfs: do not allow di_size with high bit set (bsc#1024234).\n- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).\n- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).\n- xfs: fix broken multi-fsb buffer logging (bsc#1024081).\n- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).\n- xfs: Fix lock ordering in splice write (bsc#1024788).\n- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).\n- xfs: Make xfs_icdinode-\u003edi_dmstate atomic_t (bsc#1024788).\n- xfs: pass total block res. as total xfs_bmapi_write() parameter (bsc#1029470).\n- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).\n- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2017-831,SUSE-SLE-Live-Patching-12-2017-831,SUSE-SLE-Module-Public-Cloud-12-2017-831,SUSE-SLE-SDK-12-SP1-2017-831,SUSE-SLE-SERVER-12-SP1-2017-831,SUSE-SLE-WE-12-SP1-2017-831", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1360-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:1360-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171360-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:1360-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1008842", "url": "https://bugzilla.suse.com/1008842" }, { "category": "self", "summary": "SUSE Bug 1009682", "url": "https://bugzilla.suse.com/1009682" }, { "category": "self", "summary": "SUSE Bug 1012620", "url": "https://bugzilla.suse.com/1012620" }, { "category": "self", "summary": "SUSE Bug 1012985", "url": "https://bugzilla.suse.com/1012985" }, { "category": "self", "summary": "SUSE Bug 1015703", "url": "https://bugzilla.suse.com/1015703" }, { "category": "self", "summary": "SUSE Bug 1015787", "url": "https://bugzilla.suse.com/1015787" }, { "category": "self", "summary": "SUSE Bug 1015821", "url": "https://bugzilla.suse.com/1015821" }, { "category": "self", "summary": "SUSE Bug 1017512", "url": "https://bugzilla.suse.com/1017512" }, { "category": "self", "summary": "SUSE Bug 1018100", "url": "https://bugzilla.suse.com/1018100" }, { "category": "self", "summary": "SUSE Bug 1018263", "url": "https://bugzilla.suse.com/1018263" }, { "category": "self", "summary": "SUSE Bug 1018419", "url": "https://bugzilla.suse.com/1018419" }, { "category": "self", "summary": "SUSE Bug 1018446", "url": "https://bugzilla.suse.com/1018446" }, { "category": "self", "summary": "SUSE Bug 1019168", "url": "https://bugzilla.suse.com/1019168" }, { "category": "self", "summary": "SUSE Bug 1019514", "url": "https://bugzilla.suse.com/1019514" }, { "category": "self", "summary": "SUSE Bug 1020048", "url": "https://bugzilla.suse.com/1020048" }, { "category": "self", "summary": "SUSE Bug 1020795", "url": "https://bugzilla.suse.com/1020795" }, { "category": "self", "summary": "SUSE Bug 1021256", "url": "https://bugzilla.suse.com/1021256" }, { "category": "self", "summary": "SUSE Bug 1021374", "url": "https://bugzilla.suse.com/1021374" }, { "category": "self", "summary": "SUSE Bug 1021762", "url": "https://bugzilla.suse.com/1021762" }, { "category": "self", "summary": "SUSE Bug 1021913", "url": "https://bugzilla.suse.com/1021913" }, { "category": "self", "summary": "SUSE Bug 1022559", "url": "https://bugzilla.suse.com/1022559" }, { "category": "self", "summary": "SUSE Bug 1022971", "url": "https://bugzilla.suse.com/1022971" }, { "category": "self", "summary": "SUSE Bug 1023164", "url": "https://bugzilla.suse.com/1023164" }, { "category": "self", "summary": "SUSE Bug 1023207", "url": "https://bugzilla.suse.com/1023207" }, { "category": "self", "summary": "SUSE Bug 1023377", "url": "https://bugzilla.suse.com/1023377" }, { "category": "self", "summary": "SUSE Bug 1023762", "url": "https://bugzilla.suse.com/1023762" }, { "category": "self", "summary": "SUSE Bug 1023824", "url": "https://bugzilla.suse.com/1023824" }, { "category": "self", "summary": "SUSE Bug 1023888", "url": "https://bugzilla.suse.com/1023888" }, { "category": "self", "summary": "SUSE Bug 1023992", "url": "https://bugzilla.suse.com/1023992" }, { "category": "self", "summary": "SUSE Bug 1024081", "url": "https://bugzilla.suse.com/1024081" }, { "category": "self", "summary": "SUSE Bug 1024234", "url": "https://bugzilla.suse.com/1024234" }, { "category": "self", "summary": "SUSE Bug 1024309", "url": "https://bugzilla.suse.com/1024309" }, { "category": "self", "summary": "SUSE Bug 1024508", "url": "https://bugzilla.suse.com/1024508" }, { "category": "self", "summary": "SUSE Bug 1024788", "url": "https://bugzilla.suse.com/1024788" }, { "category": "self", "summary": "SUSE Bug 1025039", "url": "https://bugzilla.suse.com/1025039" }, { "category": "self", "summary": "SUSE Bug 1025235", "url": "https://bugzilla.suse.com/1025235" }, { "category": "self", "summary": "SUSE Bug 1025354", "url": "https://bugzilla.suse.com/1025354" }, { "category": "self", "summary": "SUSE Bug 1025802", "url": "https://bugzilla.suse.com/1025802" }, { "category": "self", "summary": "SUSE Bug 1026024", "url": "https://bugzilla.suse.com/1026024" }, { "category": "self", "summary": "SUSE Bug 1026722", "url": "https://bugzilla.suse.com/1026722" }, { "category": "self", "summary": "SUSE Bug 1026914", "url": "https://bugzilla.suse.com/1026914" }, { "category": "self", "summary": "SUSE Bug 1027066", "url": "https://bugzilla.suse.com/1027066" }, { "category": "self", "summary": "SUSE Bug 1027178", "url": "https://bugzilla.suse.com/1027178" }, { "category": "self", "summary": "SUSE Bug 1027189", "url": "https://bugzilla.suse.com/1027189" }, { "category": "self", "summary": "SUSE Bug 1027190", "url": "https://bugzilla.suse.com/1027190" }, { "category": "self", "summary": "SUSE Bug 1027974", "url": "https://bugzilla.suse.com/1027974" }, { "category": "self", "summary": "SUSE Bug 1028041", "url": "https://bugzilla.suse.com/1028041" }, { "category": "self", "summary": "SUSE Bug 1028415", "url": "https://bugzilla.suse.com/1028415" }, { "category": "self", "summary": "SUSE Bug 1028595", "url": "https://bugzilla.suse.com/1028595" }, { "category": "self", "summary": "SUSE Bug 1028648", "url": "https://bugzilla.suse.com/1028648" }, { "category": "self", "summary": "SUSE Bug 1028895", "url": "https://bugzilla.suse.com/1028895" }, { "category": "self", "summary": "SUSE Bug 1029470", "url": "https://bugzilla.suse.com/1029470" }, { "category": "self", "summary": "SUSE Bug 1029850", "url": "https://bugzilla.suse.com/1029850" }, { "category": "self", "summary": "SUSE Bug 1029986", "url": "https://bugzilla.suse.com/1029986" }, { "category": "self", "summary": "SUSE Bug 1030118", "url": "https://bugzilla.suse.com/1030118" }, { "category": "self", "summary": "SUSE Bug 1030213", "url": "https://bugzilla.suse.com/1030213" }, { "category": "self", "summary": "SUSE Bug 1030593", "url": "https://bugzilla.suse.com/1030593" }, { "category": "self", "summary": "SUSE Bug 1030901", "url": "https://bugzilla.suse.com/1030901" }, { "category": "self", "summary": "SUSE Bug 1031003", "url": "https://bugzilla.suse.com/1031003" }, { "category": "self", "summary": "SUSE Bug 1031052", "url": "https://bugzilla.suse.com/1031052" }, { "category": "self", "summary": "SUSE Bug 1031080", "url": "https://bugzilla.suse.com/1031080" }, { "category": "self", "summary": "SUSE Bug 1031440", "url": "https://bugzilla.suse.com/1031440" }, { "category": "self", "summary": "SUSE Bug 1031567", "url": "https://bugzilla.suse.com/1031567" }, { "category": "self", "summary": "SUSE Bug 1031579", "url": "https://bugzilla.suse.com/1031579" }, { "category": "self", "summary": "SUSE Bug 1031662", "url": "https://bugzilla.suse.com/1031662" }, { "category": "self", "summary": "SUSE Bug 1031842", "url": "https://bugzilla.suse.com/1031842" }, { "category": "self", "summary": "SUSE Bug 1032125", "url": "https://bugzilla.suse.com/1032125" }, { "category": "self", "summary": "SUSE Bug 1032141", "url": "https://bugzilla.suse.com/1032141" }, { "category": "self", "summary": "SUSE Bug 1032344", "url": "https://bugzilla.suse.com/1032344" }, { "category": "self", "summary": "SUSE Bug 1032345", "url": "https://bugzilla.suse.com/1032345" }, { "category": "self", "summary": "SUSE Bug 1033336", "url": "https://bugzilla.suse.com/1033336" }, { "category": "self", "summary": "SUSE Bug 1034670", "url": "https://bugzilla.suse.com/1034670" }, { "category": "self", "summary": "SUSE Bug 103470", "url": "https://bugzilla.suse.com/103470" }, { "category": "self", "summary": "SUSE Bug 1034700", "url": "https://bugzilla.suse.com/1034700" }, { "category": "self", "summary": "SUSE Bug 1035576", "url": "https://bugzilla.suse.com/1035576" }, { "category": "self", "summary": "SUSE Bug 1035699", "url": "https://bugzilla.suse.com/1035699" }, { "category": "self", "summary": "SUSE Bug 1035738", "url": "https://bugzilla.suse.com/1035738" }, { "category": "self", "summary": "SUSE Bug 1035877", "url": "https://bugzilla.suse.com/1035877" }, { "category": "self", "summary": "SUSE Bug 1036752", "url": "https://bugzilla.suse.com/1036752" }, { "category": "self", "summary": "SUSE Bug 1038261", "url": "https://bugzilla.suse.com/1038261" }, { "category": "self", "summary": "SUSE Bug 799133", "url": "https://bugzilla.suse.com/799133" }, { "category": "self", "summary": "SUSE Bug 857926", "url": "https://bugzilla.suse.com/857926" }, { "category": "self", "summary": "SUSE Bug 914939", "url": "https://bugzilla.suse.com/914939" }, { "category": "self", "summary": "SUSE Bug 917630", "url": "https://bugzilla.suse.com/917630" }, { "category": "self", "summary": "SUSE Bug 922853", "url": "https://bugzilla.suse.com/922853" }, { "category": "self", "summary": "SUSE Bug 930399", "url": "https://bugzilla.suse.com/930399" }, { "category": "self", "summary": "SUSE Bug 931620", "url": "https://bugzilla.suse.com/931620" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 940946", "url": "https://bugzilla.suse.com/940946" }, { "category": "self", "summary": "SUSE Bug 954763", "url": "https://bugzilla.suse.com/954763" }, { "category": "self", "summary": "SUSE Bug 968697", "url": "https://bugzilla.suse.com/968697" }, { "category": "self", "summary": "SUSE Bug 970083", "url": "https://bugzilla.suse.com/970083" }, { "category": "self", "summary": "SUSE Bug 971933", "url": "https://bugzilla.suse.com/971933" }, { "category": "self", "summary": "SUSE Bug 979215", "url": "https://bugzilla.suse.com/979215" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983212", "url": "https://bugzilla.suse.com/983212" }, { "category": "self", "summary": "SUSE Bug 984530", "url": "https://bugzilla.suse.com/984530" }, { "category": "self", "summary": "SUSE Bug 985561", "url": "https://bugzilla.suse.com/985561" }, { "category": "self", "summary": "SUSE Bug 988065", "url": "https://bugzilla.suse.com/988065" }, { "category": "self", "summary": "SUSE Bug 989056", "url": "https://bugzilla.suse.com/989056" }, { "category": "self", "summary": "SUSE Bug 993832", "url": "https://bugzilla.suse.com/993832" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1350 page", "url": "https://www.suse.com/security/cve/CVE-2015-1350/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10044 page", "url": "https://www.suse.com/security/cve/CVE-2016-10044/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10200 page", "url": "https://www.suse.com/security/cve/CVE-2016-10200/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10208 page", "url": "https://www.suse.com/security/cve/CVE-2016-10208/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2117 page", "url": "https://www.suse.com/security/cve/CVE-2016-2117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3070 page", "url": "https://www.suse.com/security/cve/CVE-2016-3070/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5243 page", "url": "https://www.suse.com/security/cve/CVE-2016-5243/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9191 page", "url": "https://www.suse.com/security/cve/CVE-2016-9191/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9588 page", "url": "https://www.suse.com/security/cve/CVE-2016-9588/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9604 page", "url": "https://www.suse.com/security/cve/CVE-2016-9604/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2647 page", "url": "https://www.suse.com/security/cve/CVE-2017-2647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2671 page", "url": "https://www.suse.com/security/cve/CVE-2017-2671/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5669 page", "url": "https://www.suse.com/security/cve/CVE-2017-5669/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5897 page", "url": "https://www.suse.com/security/cve/CVE-2017-5897/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5986 page", "url": "https://www.suse.com/security/cve/CVE-2017-5986/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6074 page", "url": "https://www.suse.com/security/cve/CVE-2017-6074/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6214 page", "url": "https://www.suse.com/security/cve/CVE-2017-6214/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6345 page", "url": "https://www.suse.com/security/cve/CVE-2017-6345/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6346 page", "url": "https://www.suse.com/security/cve/CVE-2017-6346/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6348 page", "url": "https://www.suse.com/security/cve/CVE-2017-6348/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6353 page", "url": "https://www.suse.com/security/cve/CVE-2017-6353/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6951 page", "url": "https://www.suse.com/security/cve/CVE-2017-6951/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7187 page", "url": "https://www.suse.com/security/cve/CVE-2017-7187/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7261 page", "url": "https://www.suse.com/security/cve/CVE-2017-7261/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7294 page", "url": "https://www.suse.com/security/cve/CVE-2017-7294/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7308 page", "url": "https://www.suse.com/security/cve/CVE-2017-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7616 page", "url": "https://www.suse.com/security/cve/CVE-2017-7616/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8106 page", "url": "https://www.suse.com/security/cve/CVE-2017-8106/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-05-19T12:12:38Z", "generator": { "date": "2017-05-19T12:12:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:1360-1", "initial_release_date": "2017-05-19T12:12:38Z", "revision_history": [ { "date": "2017-05-19T12:12:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.40.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.40.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.40.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.40.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.40.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.40.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.40.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.40.1.noarch", "product_id": "kernel-source-3.12.74-60.64.40.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.74-60.64.40.4.noarch", "product": { "name": "kernel-docs-3.12.74-60.64.40.4.noarch", "product_id": "kernel-docs-3.12.74-60.64.40.4.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "product_id": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.40.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.40.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.40.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.40.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.40.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.40.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.40.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-obs-build-3.12.74-60.64.40.1.s390x", "product_id": "kernel-obs-build-3.12.74-60.64.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.40.1.s390x", "product_id": "kernel-default-3.12.74-60.64.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.40.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.40.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.40.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.40.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.40.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.40.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-default-extra-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-obs-build-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-obs-build-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.40.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.74-60.64.40.4.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch" }, "product_reference": "kernel-docs-3.12.74-60.64.40.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-obs-build-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1350" } ], "notes": [ { "category": "general", "text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1350", "url": "https://www.suse.com/security/cve/CVE-2015-1350" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-1350", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 914939 for CVE-2015-1350", "url": "https://bugzilla.suse.com/914939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2015-1350" }, { "cve": "CVE-2016-10044", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10044" } ], "notes": [ { "category": "general", "text": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10044", "url": "https://www.suse.com/security/cve/CVE-2016-10044" }, { "category": "external", "summary": "SUSE Bug 1023992 for CVE-2016-10044", "url": "https://bugzilla.suse.com/1023992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2016-10044" }, { "cve": "CVE-2016-10200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10200" } ], "notes": [ { "category": "general", "text": "Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10200", "url": "https://www.suse.com/security/cve/CVE-2016-10200" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-10200", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1028415 for CVE-2016-10200", "url": "https://bugzilla.suse.com/1028415" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2016-10200" }, { "cve": "CVE-2016-10208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10208" } ], "notes": [ { "category": "general", "text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10208", "url": "https://www.suse.com/security/cve/CVE-2016-10208" }, { "category": "external", "summary": "SUSE Bug 1023377 for CVE-2016-10208", "url": "https://bugzilla.suse.com/1023377" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2016-10208", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2016-10208" }, { "cve": "CVE-2016-2117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2117" } ], "notes": [ { "category": "general", "text": "The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2117", "url": "https://www.suse.com/security/cve/CVE-2016-2117" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-2117", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 968697 for CVE-2016-2117", "url": "https://bugzilla.suse.com/968697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2016-2117" }, { "cve": "CVE-2016-3070", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3070" } ], "notes": [ { "category": "general", "text": "The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3070", "url": "https://www.suse.com/security/cve/CVE-2016-3070" }, { "category": "external", "summary": "SUSE Bug 979215 for CVE-2016-3070", "url": "https://bugzilla.suse.com/979215" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2016-3070" }, { "cve": "CVE-2016-5243", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5243" } ], "notes": [ { "category": "general", "text": "The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5243", "url": "https://www.suse.com/security/cve/CVE-2016-5243" }, { "category": "external", "summary": "SUSE Bug 983212 for CVE-2016-5243", "url": "https://bugzilla.suse.com/983212" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5243", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2016-5243" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-9191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9191" } ], "notes": [ { "category": "general", "text": "The cgroup offline implementation in the Linux kernel through 4.8.11 mishandles certain drain operations, which allows local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application, as demonstrated by trinity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9191", "url": "https://www.suse.com/security/cve/CVE-2016-9191" }, { "category": "external", "summary": "SUSE Bug 1008842 for CVE-2016-9191", "url": "https://bugzilla.suse.com/1008842" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-9191", "url": "https://bugzilla.suse.com/1027179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2016-9191" }, { "cve": "CVE-2016-9588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9588" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9588", "url": "https://www.suse.com/security/cve/CVE-2016-9588" }, { "category": "external", "summary": "SUSE Bug 1015703 for CVE-2016-9588", "url": "https://bugzilla.suse.com/1015703" }, { "category": "external", "summary": "SUSE Bug 1017512 for CVE-2016-9588", "url": "https://bugzilla.suse.com/1017512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2016-9588" }, { "cve": "CVE-2016-9604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9604" } ], "notes": [ { "category": "general", "text": "It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as \u0027.dns_resolver\u0027 in RHEL-7 or \u0027.builtin_trusted_keys\u0027 upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9604", "url": "https://www.suse.com/security/cve/CVE-2016-9604" }, { "category": "external", "summary": "SUSE Bug 1035576 for CVE-2016-9604", "url": "https://bugzilla.suse.com/1035576" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2016-9604" }, { "cve": "CVE-2017-2647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2647" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2647", "url": "https://www.suse.com/security/cve/CVE-2017-2647" }, { "category": "external", "summary": "SUSE Bug 1030593 for CVE-2017-2647", "url": "https://bugzilla.suse.com/1030593" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2647", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2017-2647" }, { "cve": "CVE-2017-2671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2671" } ], "notes": [ { "category": "general", "text": "The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2671", "url": "https://www.suse.com/security/cve/CVE-2017-2671" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031003 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1031003" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2017-2671" }, { "cve": "CVE-2017-5669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5669" } ], "notes": [ { "category": "general", "text": "The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5669", "url": "https://www.suse.com/security/cve/CVE-2017-5669" }, { "category": "external", "summary": "SUSE Bug 1026914 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1026914" }, { "category": "external", "summary": "SUSE Bug 1102390 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1102390" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-5669" }, { "cve": "CVE-2017-5897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5897" } ], "notes": [ { "category": "general", "text": "The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5897", "url": "https://www.suse.com/security/cve/CVE-2017-5897" }, { "category": "external", "summary": "SUSE Bug 1023762 for CVE-2017-5897", "url": "https://bugzilla.suse.com/1023762" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-5897", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-5897" }, { "cve": "CVE-2017-5986", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5986" } ], "notes": [ { "category": "general", "text": "Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5986", "url": "https://www.suse.com/security/cve/CVE-2017-5986" }, { "category": "external", "summary": "SUSE Bug 1025235 for CVE-2017-5986", "url": "https://bugzilla.suse.com/1025235" }, { "category": "external", "summary": "SUSE Bug 1027066 for CVE-2017-5986", "url": "https://bugzilla.suse.com/1027066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-5986" }, { "cve": "CVE-2017-6074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6074" } ], "notes": [ { "category": "general", "text": "The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6074", "url": "https://www.suse.com/security/cve/CVE-2017-6074" }, { "category": "external", "summary": "SUSE Bug 1026024 for CVE-2017-6074", "url": "https://bugzilla.suse.com/1026024" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2017-6074", "url": "https://bugzilla.suse.com/1072204" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2017-6074" }, { "cve": "CVE-2017-6214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6214" } ], "notes": [ { "category": "general", "text": "The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6214", "url": "https://www.suse.com/security/cve/CVE-2017-6214" }, { "category": "external", "summary": "SUSE Bug 1026722 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1026722" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-6214" }, { "cve": "CVE-2017-6345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6345" } ], "notes": [ { "category": "general", "text": "The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6345", "url": "https://www.suse.com/security/cve/CVE-2017-6345" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1027190 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1027190" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-6345" }, { "cve": "CVE-2017-6346", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6346" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6346", "url": "https://www.suse.com/security/cve/CVE-2017-6346" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1027189 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1027189" }, { "category": "external", "summary": "SUSE Bug 1064388 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1064388" }, { "category": "external", "summary": "SUSE Bug 1064392 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1064392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2017-6346" }, { "cve": "CVE-2017-6348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6348" } ], "notes": [ { "category": "general", "text": "The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6348", "url": "https://www.suse.com/security/cve/CVE-2017-6348" }, { "category": "external", "summary": "SUSE Bug 1027178 for CVE-2017-6348", "url": "https://bugzilla.suse.com/1027178" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-6348", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-6348" }, { "cve": "CVE-2017-6353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6353" } ], "notes": [ { "category": "general", "text": "net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6353", "url": "https://www.suse.com/security/cve/CVE-2017-6353" }, { "category": "external", "summary": "SUSE Bug 1025235 for CVE-2017-6353", "url": "https://bugzilla.suse.com/1025235" }, { "category": "external", "summary": "SUSE Bug 1027066 for CVE-2017-6353", "url": "https://bugzilla.suse.com/1027066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-6353" }, { "cve": "CVE-2017-6951", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6951" } ], "notes": [ { "category": "general", "text": "The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the \"dead\" type.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6951", "url": "https://www.suse.com/security/cve/CVE-2017-6951" }, { "category": "external", "summary": "SUSE Bug 1029850 for CVE-2017-6951", "url": "https://bugzilla.suse.com/1029850" }, { "category": "external", "summary": "SUSE Bug 1030593 for CVE-2017-6951", "url": "https://bugzilla.suse.com/1030593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-6951" }, { "cve": "CVE-2017-7187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7187" } ], "notes": [ { "category": "general", "text": "The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7187", "url": "https://www.suse.com/security/cve/CVE-2017-7187" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1030213 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1030213" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-7187" }, { "cve": "CVE-2017-7261", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7261" } ], "notes": [ { "category": "general", "text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7261", "url": "https://www.suse.com/security/cve/CVE-2017-7261" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7261", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031052 for CVE-2017-7261", "url": "https://bugzilla.suse.com/1031052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-7261" }, { "cve": "CVE-2017-7294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7294" } ], "notes": [ { "category": "general", "text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7294", "url": "https://www.suse.com/security/cve/CVE-2017-7294" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031440 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1031440" }, { "category": "external", "summary": "SUSE Bug 1031481 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1031481" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-7294" }, { "cve": "CVE-2017-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7308" } ], "notes": [ { "category": "general", "text": "The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7308", "url": "https://www.suse.com/security/cve/CVE-2017-7308" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031579 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1031579" }, { "category": "external", "summary": "SUSE Bug 1031660 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1031660" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-7308" }, { "cve": "CVE-2017-7616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7616" } ], "notes": [ { "category": "general", "text": "Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7616", "url": "https://www.suse.com/security/cve/CVE-2017-7616" }, { "category": "external", "summary": "SUSE Bug 1033336 for CVE-2017-7616", "url": "https://bugzilla.suse.com/1033336" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2017-7616" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8106" } ], "notes": [ { "category": "general", "text": "The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8106", "url": "https://www.suse.com/security/cve/CVE-2017-8106" }, { "category": "external", "summary": "SUSE Bug 1035877 for CVE-2017-8106", "url": "https://bugzilla.suse.com/1035877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2017-8106" } ] }
fkie_cve-2016-10044
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
android | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE61EB40-EE9C-41E8-AC78-D38441DB9CF6", "versionEndExcluding": "3.16.43", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "21856BF4-4072-4055-BA57-93D5C4608C07", "versionEndExcluding": "4.4.24", "versionStartIncluding": "3.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "004A2488-AD73-4B53-961A-EEA808A5183D", "versionEndExcluding": "4.7.7", "versionStartIncluding": "4.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F11609D-D1B4-4DD6-8CC7-A224344E1E67", "versionEndIncluding": "7.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call." }, { "lang": "es", "value": "La funci\u00f3n aio_mount en fs/aio.c en el kernel de Linux en versiones anteriores a 4.7.7 no restringe adecuadamente el acceso de ejecuci\u00f3n, lo que facilita a usuarios locales eludir restricciones de pol\u00edtica destinadas SELinux W^X, y consecuentemente obtener privilegios, a trav\u00e9s de una llamada de sistema io_setup." } ], "id": "CVE-2016-10044", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-07T07:59:00.293", "references": [ { "source": "security@android.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "source": "security@android.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://source.android.com/security/bulletin/2017-02-01.html" }, { "source": "security@android.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7" }, { "source": "security@android.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96122" }, { "source": "security@android.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037798" }, { "source": "security@android.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://source.android.com/security/bulletin/2017-02-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a" } ], "sourceIdentifier": "security@android.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.