Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2016-6130
Vulnerability from cvelistv5
Published
2016-07-03 21:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:22:20.528Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { name: "DSA-3616", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3616", }, { name: "91540", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91540", }, { name: "20160630 [CVE-2016-6130] Double-Fetch Vulnerability in Linux-4.5/drivers/s390/char/sclp_ctl.c", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/538803/30/0/threaded", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.kernel.org/show_bug.cgi?id=116741", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-04-27T00:00:00", descriptions: [ { lang: "en", value: "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-25T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { name: "DSA-3616", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3616", }, { name: "91540", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91540", }, { name: "20160630 [CVE-2016-6130] Double-Fetch Vulnerability in Linux-4.5/drivers/s390/char/sclp_ctl.c", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/538803/30/0/threaded", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.kernel.org/show_bug.cgi?id=116741", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-6130", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", refsource: "CONFIRM", url: "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { name: "DSA-3616", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3616", }, { name: "91540", refsource: "BID", url: "http://www.securityfocus.com/bid/91540", }, { name: "20160630 [CVE-2016-6130] Double-Fetch Vulnerability in Linux-4.5/drivers/s390/char/sclp_ctl.c", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/538803/30/0/threaded", }, { name: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6", refsource: "CONFIRM", url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { name: "https://bugzilla.kernel.org/show_bug.cgi?id=116741", refsource: "CONFIRM", url: "https://bugzilla.kernel.org/show_bug.cgi?id=116741", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-6130", datePublished: "2016-07-03T21:00:00", dateReserved: "2016-06-30T00:00:00", dateUpdated: "2024-08-06T01:22:20.528Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2016-6130\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-07-03T21:59:18.040\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \\\"double fetch\\\" vulnerability.\"},{\"lang\":\"es\",\"value\":\"Condición de carrera en la función sclp_ctl_ioctl_sccb en drivers/s390/char/sclp_ctl.c en el kernel de Linux en versiones anteriores a 4.6 permite a usuarios locales obtener información sensible de la memoria del kernel cambiando un valor de longitud determinado, también conocida como una vulnerabilidad \\\"double fetch\\\".\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":1.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.5.5\",\"matchCriteriaId\":\"2870CD78-709E-4894-8CE7-147FD70F4070\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3616\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/538803/30/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/91540\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.kernel.org/show_bug.cgi?id=116741\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3616\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/538803/30/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/91540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.kernel.org/show_bug.cgi?id=116741\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}", }, }
ghsa-fr42-mwm8-m9x7
Vulnerability from github
Published
2022-05-17 03:39
Modified
2022-05-17 03:39
Severity ?
Details
Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.
{ affected: [], aliases: [ "CVE-2016-6130", ], database_specific: { cwe_ids: [ "CWE-362", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2016-07-03T21:59:00Z", severity: "MODERATE", }, details: "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", id: "GHSA-fr42-mwm8-m9x7", modified: "2022-05-17T03:39:47Z", published: "2022-05-17T03:39:47Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2016-6130", }, { type: "WEB", url: "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { type: "WEB", url: "https://bugzilla.kernel.org/show_bug.cgi?id=116741", }, { type: "WEB", url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { type: "WEB", url: "http://www.debian.org/security/2016/dsa-3616", }, { type: "WEB", url: "http://www.securityfocus.com/archive/1/538803/30/0/threaded", }, { type: "WEB", url: "http://www.securityfocus.com/bid/91540", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", type: "CVSS_V3", }, ], }
suse-su-2016:2912-1
Vulnerability from csaf_suse
Published
2016-11-25 12:49
Modified
2016-11-25 12:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to 3.12.67 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in
the Linux kernel used an incorrect buffer size for certain timeout data,
which allowed local users to cause a denial of service (stack memory
corruption and panic) by reading the /proc/keys file (bsc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel
preserved the setgid bit during a setxattr call, which allowed local
users to gain group privileges by leveraging the existence of a setgid
program with restrictions on execute permissions (bsc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in
net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to
obtain sensitive information or cause a denial of service (NULL pointer
dereference) via vectors involving a bind system call on a Bluetooth
RFCOMM socket (bnc#1003925).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly
determine the rate of challenge ACK segments, which made it easier for
man-in-the-middle attackers to hijack TCP sessions via a blind in-window
attack (bnc#989152).
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in
drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to
obtain sensitive information from kernel memory by changing a certain
length value, aka a 'double fetch' vulnerability (bnc#987542).
- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux
kernel allowed local users to cause a denial of service (NULL pointer
dereference and system crash) by using an ABORT_TASK command to abort
a device write operation (bnc#994748).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in
drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users
to cause a denial of service (out-of-bounds access or system crash)
by changing a certain size value, aka a 'double fetch' vulnerability
(bnc#991608).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h
in the Linux kernel did not properly maintain certain SACK state after a
failed data copy, which allowed local users to cause a denial of service
(tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted
SACK option (bnc#994296).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in
drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict
a certain length field, which allowed local users to gain privileges
or cause a denial of service (heap-based buffer overflow) via an
ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-8658: Stack-based buffer overflow
in the brcmf_cfg80211_start_ap function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel allowed local users to cause a denial of service (system crash)
or possibly have unspecified other impact via a long SSID Information
Element in a command to a Netlink socket (bnc#1004462).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers
to cause a denial of service (stack consumption and panic) or possibly
have unspecified other impact by triggering use of the GRO path for
packets with tunnel stacking, as demonstrated by interleaved IPv4 headers
and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486).
The following non-security bugs were fixed:
- aacraid: Fix RRQ overload (bsc#1003079).
- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up (FATE#315621).
- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).
- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).
- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing (fate#315482)).
- arm64: mm: remove broken &= operator from pmd_mknotpresent (Automatic NUMA Balancing (fate#315482)).
- avoid dentry crash triggered by NFS (bsc#984194).
- be2net: Don't leak iomapped memory on removal (bsc#921784).
- be2net: fix BE3-R FW download compatibility check (bsc#921784).
- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784).
- be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784).
- blkfront: fix an error path memory leak (luckily none so far).
- blk-mq: fix undefined behaviour in order_to_size() (fate#315209).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes (fate#316924).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring (fate#316924).
- bonding: Prevent IPv6 link local address on enslaved devices (fate#316924).
- bonding: prevent out of bound accesses (fate#316924).
- bonding: set carrier off for devices created through netlink (bsc#999577).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)
- btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).
- btrfs: reorder patches to place local patches back at the end of the series
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- ceph: After a write, we must free the 'request', not the 'response'. This error crept in during the backport. bsc#995153
- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).
- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).
- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).
- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).
- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)
- Document the process to blacklist upstream commit-ids
- drivers/hv: share Hyper-V SynIC constants with userspace (bnc#937888).
- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#937888).
- drivers: hv: vmbus: avoid unneeded compiler optimizations in vmbus_wait_for_unload() (bnc#937888).
- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#937888).
- drivers: hv: vmbus: Cleanup vmbus_set_event() (bnc#937888).
- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#937888).
- drivers: hv: vmbus: do not manipulate with clocksources on crash (bnc#937888).
- drivers: hv: vmbus: Force all channel messages to be delivered on CPU 0 (bnc#937888).
- drivers: hv: vmbus: Get rid of the unused irq variable (bnc#937888).
- drivers: hv: vmbus: handle various crash scenarios (bnc#937888).
- drivers: hv: vmbus: remove code duplication in message handling (bnc#937888).
- drivers: hv: vmbus: Support handling messages on multiple CPUs (bnc#937888).
- drivers: hv: vmbus: Support kexec on ws2012 r2 and above (bnc#937888).
- efi: Small leak on error in runtime map code (fate#315019).
- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- ext4: Fixup handling for custom configs.
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- hyperv: enable call to clockevents_unbind_device in kexec/kdump path
- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel
- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).
- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).
- input: Revert 'can: dev: fix deadlock reported after bus-off'.
- input: Revert 'Input: i8042 - break load dependency between atkbd/psmouse and i8042'.
- input: Revert 'Input: i8042 - set up shared ps2_cmd_mutex for AUX ports'.
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).
- ipv6: Fix improper use or RCU (bsc#961257)
- ipv6: fix multipath route replace error recovery (bsc#930399).
- ipv6: KABI workaround for ipv6: add complete rcu protection around np->opt.
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).
- iwlwifi: dvm: fix flush support for old firmware (bsc#940545).
- kabi: clockevents: export clockevents_unbind again.
- kabi: Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- kabi: hide harmless change in struct inet_connection_sock (fate#318553).
- kABI: protect backing-dev include in mm/migrate.
- kABI: protect enum usb_device_speed.
- kABI: protect struct mlx5_modify_qp_mbox_in.
- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).
- kernel/printk/printk.c: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).
- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).
- Kvm: vmx: defer load of APIC access page address during reset (bsc#959463).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).
- libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).
- memcg: convert threshold to bytes (bnc#931454).
- memcg: fix thresholds for 32b architectures (bnc#931454).
- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975 VM performance -- git fixes).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- module: Issue warnings when tainting kernel (bsc#974406).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- MSI-X: fix an error path (luckily none so far).
- netback: fix flipping mode (bsc#996664).
- netback: fix refounting (bsc#978094).
- netfront: don't truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).
- nfs: Add a stub for GETDEVICELIST (bnc#898675).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfsd: Use free_conn to free connection (bsc#979451).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).
- nfs: fix pg_test page count calculation (bnc#898675).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).
- oom: print nodemask in the oom report (bnc#1003866).
- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).
- perf/x86/intel: Fix bug for 'cycles:p' and 'cycles:pp' on SLM (bsc#997896).
- pm / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).
- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).
- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).
- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)
- radeon: avoid boot hang in Xen Dom0 (luckily none so far).
- ratelimit: extend to print suppressed messages on release (bsc#979928).
- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- rpm/config.sh: Set the SP1 release string to 60.<RELEASE> (bsc#997059)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rtnetlink: avoid 0 sized arrays (fate#316924).
- s390: add SMT support (bnc#994438, LTC#144756).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- sunrpc: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).
- sunrpc: Fix a regression when reconnecting (bsc#946309).
- supported.conf: Add ext2
- supported.conf: Add iscsi modules to -base (bsc#997299)
- supported.conf: Add tun to -base (bsc#992593)
- supported.conf: Add veth to -base (bsc#992591)
- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).
- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).
- tcp: add proper TS val into RST packets (bsc#937086).
- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).
- tcp: fix child sockets to use system default congestion control if not set (fate#318553).
- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).
- tcp: refresh skb timestamp at retransmit time (bsc#937086).
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).
- Update patches.kabi/kabi.clockevents_unbind.patch (bnc#937888).
- uprobes: Fix the memcg accounting (bnc#931454).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).
- xenbus: don't invoke ->is_ready() for most device states (bsc#987333).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: Linux 3.12.63.
- xen/pciback: Fix conf_space read/write overlap check.
- xen-pciback: return proper values during BAR sizing.
- xen: Refresh patches.xen/xen3-patch-3.9 (bsc#991247).
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).
- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: silence warnings in switch (bnc#991665).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1700,SUSE-SLE-Live-Patching-12-2016-1700,SUSE-SLE-Module-Public-Cloud-12-2016-1700,SUSE-SLE-SDK-12-SP1-2016-1700,SUSE-SLE-SERVER-12-SP1-2016-1700,SUSE-SLE-WE-12-SP1-2016-1700
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 kernel was updated to 3.12.67 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in\n the Linux kernel used an incorrect buffer size for certain timeout data,\n which allowed local users to cause a denial of service (stack memory\n corruption and panic) by reading the /proc/keys file (bsc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel\n preserved the setgid bit during a setxattr call, which allowed local\n users to gain group privileges by leveraging the existence of a setgid\n program with restrictions on execute permissions (bsc#995968).\n- CVE-2015-8956: The rfcomm_sock_bind function in\n net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to\n obtain sensitive information or cause a denial of service (NULL pointer\n dereference) via vectors involving a bind system call on a Bluetooth\n RFCOMM socket (bnc#1003925).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly\n determine the rate of challenge ACK segments, which made it easier for\n man-in-the-middle attackers to hijack TCP sessions via a blind in-window\n attack (bnc#989152).\n- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in\n drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to\n obtain sensitive information from kernel memory by changing a certain\n length value, aka a 'double fetch' vulnerability (bnc#987542).\n- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux\n kernel allowed local users to cause a denial of service (NULL pointer\n dereference and system crash) by using an ABORT_TASK command to abort\n a device write operation (bnc#994748).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in\n drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users\n to cause a denial of service (out-of-bounds access or system crash)\n by changing a certain size value, aka a 'double fetch' vulnerability\n (bnc#991608).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h\n in the Linux kernel did not properly maintain certain SACK state after a\n failed data copy, which allowed local users to cause a denial of service\n (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted\n SACK option (bnc#994296).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in\n drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict\n a certain length field, which allowed local users to gain privileges\n or cause a denial of service (heap-based buffer overflow) via an\n ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-8658: Stack-based buffer overflow\n in the brcmf_cfg80211_start_ap function in\n drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux\n kernel allowed local users to cause a denial of service (system crash)\n or possibly have unspecified other impact via a long SSID Information\n Element in a command to a Netlink socket (bnc#1004462).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers\n to cause a denial of service (stack consumption and panic) or possibly\n have unspecified other impact by triggering use of the GRO path for\n packets with tunnel stacking, as demonstrated by interleaved IPv4 headers\n and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486).\n\nThe following non-security bugs were fixed:\n\n- aacraid: Fix RRQ overload (bsc#1003079).\n- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up (FATE#315621).\n- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).\n- apparmor: add missing id bounds check on dfa verification (bsc#1000304).\n- apparmor: check that xindex is in trans_table bounds (bsc#1000304).\n- apparmor: do not expose kernel stack (bsc#1000304).\n- apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304).\n- apparmor: ensure the target profile name is always audited (bsc#1000304).\n- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).\n- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).\n- apparmor: fix audit full profile hname on successful load (bsc#1000304).\n- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).\n- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).\n- apparmor: fix log failures for all profiles in a set (bsc#1000304).\n- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).\n- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).\n- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).\n- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).\n- apparmor: fix refcount bug in profile replacement (bsc#1000304).\n- apparmor: fix refcount race when finding a child profile (bsc#1000304).\n- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).\n- apparmor: fix uninitialized lsm_audit member (bsc#1000304).\n- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).\n- apparmor: internal paths should be treated as disconnected (bsc#1000304).\n- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).\n- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing (fate#315482)).\n- arm64: mm: remove broken &= operator from pmd_mknotpresent (Automatic NUMA Balancing (fate#315482)).\n- avoid dentry crash triggered by NFS (bsc#984194).\n- be2net: Don't leak iomapped memory on removal (bsc#921784).\n- be2net: fix BE3-R FW download compatibility check (bsc#921784).\n- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784).\n- be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784).\n- blkfront: fix an error path memory leak (luckily none so far).\n- blk-mq: fix undefined behaviour in order_to_size() (fate#315209).\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes (fate#316924).\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring (fate#316924).\n- bonding: Prevent IPv6 link local address on enslaved devices (fate#316924).\n- bonding: prevent out of bound accesses (fate#316924).\n- bonding: set carrier off for devices created through netlink (bsc#999577).\n- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).\n- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).\n- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).\n- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)\n- btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489).\n- btrfs: handle quota reserve failure properly (bsc#1005666).\n- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).\n- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).\n- btrfs: properly track when rescan worker is running (bsc#989953).\n- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).\n- btrfs: reorder patches to place local patches back at the end of the series\n- btrfs: skip superblocks during discard (bsc#904489).\n- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).\n- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- ceph: After a write, we must free the 'request', not the 'response'. This error crept in during the backport. bsc#995153\n- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).\n- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).\n- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).\n- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).\n- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).\n- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).\n- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)\n- Document the process to blacklist upstream commit-ids\n- drivers/hv: share Hyper-V SynIC constants with userspace (bnc#937888).\n- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#937888).\n- drivers: hv: vmbus: avoid unneeded compiler optimizations in vmbus_wait_for_unload() (bnc#937888).\n- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#937888).\n- drivers: hv: vmbus: Cleanup vmbus_set_event() (bnc#937888).\n- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#937888).\n- drivers: hv: vmbus: do not manipulate with clocksources on crash (bnc#937888).\n- drivers: hv: vmbus: Force all channel messages to be delivered on CPU 0 (bnc#937888).\n- drivers: hv: vmbus: Get rid of the unused irq variable (bnc#937888).\n- drivers: hv: vmbus: handle various crash scenarios (bnc#937888).\n- drivers: hv: vmbus: remove code duplication in message handling (bnc#937888).\n- drivers: hv: vmbus: Support handling messages on multiple CPUs (bnc#937888).\n- drivers: hv: vmbus: Support kexec on ws2012 r2 and above (bnc#937888).\n- efi: Small leak on error in runtime map code (fate#315019).\n- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)\n- ext4: Add parameter for tuning handling of ext2 (bsc#976195).\n- ext4: Fixup handling for custom configs.\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- hyperv: enable call to clockevents_unbind_device in kexec/kdump path\n- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel\n- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).\n- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).\n- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).\n- input: Revert 'can: dev: fix deadlock reported after bus-off'.\n- input: Revert 'Input: i8042 - break load dependency between atkbd/psmouse and i8042'.\n- input: Revert 'Input: i8042 - set up shared ps2_cmd_mutex for AUX ports'.\n- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).\n- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).\n- ipv6: Fix improper use or RCU (bsc#961257)\n- ipv6: fix multipath route replace error recovery (bsc#930399).\n- ipv6: KABI workaround for ipv6: add complete rcu protection around np->opt.\n- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).\n- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).\n- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).\n- iwlwifi: dvm: fix flush support for old firmware (bsc#940545).\n- kabi: clockevents: export clockevents_unbind again.\n- kabi: Fix kabi change cause by adding flock_owner to open_context (bsc#998689).\n- kabi: hide harmless change in struct inet_connection_sock (fate#318553).\n- kABI: protect backing-dev include in mm/migrate.\n- kABI: protect enum usb_device_speed.\n- kABI: protect struct mlx5_modify_qp_mbox_in.\n- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).\n- kernel/printk/printk.c: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).\n- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).\n- Kvm: vmx: defer load of APIC access page address during reset (bsc#959463).\n- libceph: enable large, variable-sized OSD requests (bsc#988715).\n- libceph: make r_request msg_size calculation clearer (bsc#988715).\n- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).\n- libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715).\n- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).\n- memcg: convert threshold to bytes (bnc#931454).\n- memcg: fix thresholds for 32b architectures (bnc#931454).\n- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975 VM performance -- git fixes).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- module: Issue warnings when tainting kernel (bsc#974406).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- MSI-X: fix an error path (luckily none so far).\n- netback: fix flipping mode (bsc#996664).\n- netback: fix refounting (bsc#978094).\n- netfront: don't truncate grant references.\n- netfront: use correct linear area after linearizing an skb (bsc#1007886).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).\n- nfs: Add a stub for GETDEVICELIST (bnc#898675).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfsd: Use free_conn to free connection (bsc#979451).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).\n- nfs: fix pg_test page count calculation (bnc#898675).\n- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).\n- oom: print nodemask in the oom report (bnc#1003866).\n- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).\n- perf/x86/intel: Fix bug for 'cycles:p' and 'cycles:pp' on SLM (bsc#997896).\n- pm / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).\n- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).\n- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).\n- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).\n- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)\n- radeon: avoid boot hang in Xen Dom0 (luckily none so far).\n- ratelimit: extend to print suppressed messages on release (bsc#979928).\n- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).\n- rbd: truncate objects on cmpext short reads (bsc#988715).\n- rpm/config.sh: Set the SP1 release string to 60.<RELEASE> (bsc#997059)\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- rtnetlink: avoid 0 sized arrays (fate#316924).\n- s390: add SMT support (bnc#994438, LTC#144756).\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).\n- squashfs3: properly handle dir_emit() failures (bsc#998795).\n- sunrpc: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).\n- sunrpc: Fix a regression when reconnecting (bsc#946309).\n- supported.conf: Add ext2\n- supported.conf: Add iscsi modules to -base (bsc#997299)\n- supported.conf: Add tun to -base (bsc#992593)\n- supported.conf: Add veth to -base (bsc#992591)\n- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).\n- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).\n- tcp: add proper TS val into RST packets (bsc#937086).\n- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).\n- tcp: fix child sockets to use system default congestion control if not set (fate#318553).\n- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).\n- tcp: refresh skb timestamp at retransmit time (bsc#937086).\n- timers: Use proper base migration in add_timer_on() (bnc#993392).\n- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).\n- tunnels: Remove encapsulation offloads on decap (bsc#1001486).\n- Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).\n- Update patches.kabi/kabi.clockevents_unbind.patch (bnc#937888).\n- uprobes: Fix the memcg accounting (bnc#931454).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).\n- xenbus: don't invoke ->is_ready() for most device states (bsc#987333).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen: Linux 3.12.63.\n- xen/pciback: Fix conf_space read/write overlap check.\n- xen-pciback: return proper values during BAR sizing.\n- xen: Refresh patches.xen/xen3-patch-3.9 (bsc#991247).\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).\n- xfs: fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).\n- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- xhci: silence warnings in switch (bnc#991665).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-DESKTOP-12-SP1-2016-1700,SUSE-SLE-Live-Patching-12-2016-1700,SUSE-SLE-Module-Public-Cloud-12-2016-1700,SUSE-SLE-SDK-12-SP1-2016-1700,SUSE-SLE-SERVER-12-SP1-2016-1700,SUSE-SLE-WE-12-SP1-2016-1700", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2912-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:2912-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:2912-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html", }, { category: "self", summary: "SUSE Bug 1000189", url: "https://bugzilla.suse.com/1000189", }, { category: "self", summary: "SUSE Bug 1000287", url: "https://bugzilla.suse.com/1000287", }, { category: "self", summary: "SUSE Bug 1000304", url: "https://bugzilla.suse.com/1000304", }, { category: "self", summary: "SUSE Bug 1000776", url: "https://bugzilla.suse.com/1000776", }, { category: "self", summary: "SUSE Bug 1001419", url: "https://bugzilla.suse.com/1001419", }, { category: "self", summary: "SUSE Bug 1001486", url: "https://bugzilla.suse.com/1001486", }, { category: "self", summary: "SUSE Bug 1002165", url: "https://bugzilla.suse.com/1002165", }, { category: "self", summary: "SUSE Bug 1003079", url: "https://bugzilla.suse.com/1003079", }, { category: "self", summary: "SUSE Bug 1003153", url: "https://bugzilla.suse.com/1003153", }, { category: "self", summary: "SUSE Bug 1003400", url: "https://bugzilla.suse.com/1003400", }, { category: "self", summary: "SUSE Bug 1003568", url: "https://bugzilla.suse.com/1003568", }, { category: "self", summary: "SUSE Bug 1003866", url: "https://bugzilla.suse.com/1003866", }, { category: "self", summary: "SUSE Bug 1003925", url: "https://bugzilla.suse.com/1003925", }, { category: "self", summary: "SUSE Bug 1003964", url: "https://bugzilla.suse.com/1003964", }, { category: "self", summary: "SUSE Bug 1004252", url: "https://bugzilla.suse.com/1004252", }, { category: "self", summary: "SUSE Bug 1004462", url: "https://bugzilla.suse.com/1004462", }, { category: "self", summary: "SUSE Bug 1004517", url: "https://bugzilla.suse.com/1004517", }, { category: "self", summary: "SUSE Bug 1004520", url: "https://bugzilla.suse.com/1004520", }, { category: "self", summary: "SUSE Bug 1005666", url: "https://bugzilla.suse.com/1005666", }, { category: "self", summary: "SUSE Bug 1006691", url: "https://bugzilla.suse.com/1006691", }, { category: "self", summary: "SUSE Bug 1007615", url: "https://bugzilla.suse.com/1007615", }, { category: "self", summary: "SUSE Bug 1007886", url: "https://bugzilla.suse.com/1007886", }, { category: "self", summary: "SUSE Bug 744692", url: "https://bugzilla.suse.com/744692", }, { category: "self", summary: "SUSE Bug 772786", url: "https://bugzilla.suse.com/772786", }, { category: "self", summary: "SUSE Bug 789311", url: "https://bugzilla.suse.com/789311", }, { category: "self", summary: "SUSE Bug 857397", url: "https://bugzilla.suse.com/857397", }, { category: "self", summary: "SUSE Bug 860441", url: "https://bugzilla.suse.com/860441", }, { category: "self", summary: "SUSE Bug 865545", url: "https://bugzilla.suse.com/865545", }, { category: "self", summary: "SUSE Bug 866130", url: "https://bugzilla.suse.com/866130", }, { category: "self", summary: "SUSE Bug 868923", url: "https://bugzilla.suse.com/868923", }, { category: "self", summary: "SUSE Bug 874131", url: "https://bugzilla.suse.com/874131", }, { category: "self", summary: "SUSE Bug 876463", url: "https://bugzilla.suse.com/876463", }, { category: "self", summary: "SUSE Bug 898675", url: "https://bugzilla.suse.com/898675", }, { category: "self", summary: "SUSE Bug 904489", url: "https://bugzilla.suse.com/904489", }, { category: "self", summary: "SUSE Bug 909994", url: "https://bugzilla.suse.com/909994", }, { category: "self", summary: "SUSE Bug 911687", url: "https://bugzilla.suse.com/911687", }, { category: "self", summary: "SUSE Bug 915183", url: "https://bugzilla.suse.com/915183", }, { category: "self", summary: "SUSE Bug 921338", url: "https://bugzilla.suse.com/921338", }, { category: "self", summary: "SUSE Bug 921784", url: "https://bugzilla.suse.com/921784", }, { category: "self", summary: "SUSE Bug 922064", url: "https://bugzilla.suse.com/922064", }, { category: "self", summary: "SUSE Bug 922634", url: "https://bugzilla.suse.com/922634", }, { category: "self", summary: "SUSE Bug 924381", url: "https://bugzilla.suse.com/924381", }, { category: "self", summary: "SUSE Bug 924384", url: "https://bugzilla.suse.com/924384", }, { category: "self", summary: "SUSE Bug 930399", url: "https://bugzilla.suse.com/930399", }, { category: "self", summary: "SUSE Bug 931454", url: "https://bugzilla.suse.com/931454", }, { category: "self", summary: "SUSE Bug 934067", url: "https://bugzilla.suse.com/934067", }, { category: "self", summary: "SUSE Bug 937086", url: "https://bugzilla.suse.com/937086", }, { category: "self", summary: "SUSE Bug 937888", url: "https://bugzilla.suse.com/937888", }, { category: "self", summary: "SUSE Bug 940545", url: "https://bugzilla.suse.com/940545", }, { category: "self", summary: "SUSE Bug 941420", url: "https://bugzilla.suse.com/941420", }, { category: "self", summary: "SUSE Bug 946309", url: "https://bugzilla.suse.com/946309", }, { category: "self", summary: "SUSE Bug 955446", url: "https://bugzilla.suse.com/955446", }, { category: "self", summary: "SUSE Bug 956514", url: "https://bugzilla.suse.com/956514", }, { category: "self", summary: "SUSE Bug 959463", url: "https://bugzilla.suse.com/959463", }, { category: "self", summary: "SUSE Bug 961257", url: "https://bugzilla.suse.com/961257", }, { category: "self", summary: "SUSE Bug 962846", url: "https://bugzilla.suse.com/962846", }, { category: "self", summary: "SUSE Bug 966864", url: "https://bugzilla.suse.com/966864", }, { category: "self", summary: "SUSE Bug 967640", url: "https://bugzilla.suse.com/967640", }, { category: "self", summary: "SUSE Bug 970943", url: "https://bugzilla.suse.com/970943", }, { category: "self", summary: "SUSE Bug 971975", url: "https://bugzilla.suse.com/971975", }, { category: "self", summary: "SUSE Bug 971989", url: "https://bugzilla.suse.com/971989", }, { category: "self", summary: "SUSE Bug 974406", url: "https://bugzilla.suse.com/974406", }, { category: "self", summary: "SUSE Bug 974620", url: "https://bugzilla.suse.com/974620", }, { category: "self", summary: "SUSE Bug 975596", url: "https://bugzilla.suse.com/975596", }, { category: "self", summary: "SUSE Bug 975772", url: "https://bugzilla.suse.com/975772", }, { category: "self", summary: "SUSE Bug 976195", url: "https://bugzilla.suse.com/976195", }, { category: "self", summary: "SUSE Bug 977687", url: "https://bugzilla.suse.com/977687", }, { category: "self", summary: "SUSE Bug 978094", url: "https://bugzilla.suse.com/978094", }, { category: "self", summary: "SUSE Bug 979451", url: "https://bugzilla.suse.com/979451", }, { category: "self", summary: "SUSE Bug 979928", url: "https://bugzilla.suse.com/979928", }, { category: "self", summary: "SUSE Bug 982783", url: "https://bugzilla.suse.com/982783", }, { category: "self", summary: "SUSE Bug 983619", url: "https://bugzilla.suse.com/983619", }, { category: "self", summary: "SUSE Bug 984194", url: "https://bugzilla.suse.com/984194", }, { category: "self", summary: "SUSE Bug 984419", url: "https://bugzilla.suse.com/984419", }, { category: "self", summary: "SUSE Bug 984779", url: "https://bugzilla.suse.com/984779", }, { category: "self", summary: "SUSE Bug 984992", url: "https://bugzilla.suse.com/984992", }, { category: "self", summary: "SUSE Bug 985562", url: "https://bugzilla.suse.com/985562", }, { category: "self", summary: "SUSE Bug 986445", url: "https://bugzilla.suse.com/986445", }, { category: "self", summary: "SUSE Bug 987192", url: "https://bugzilla.suse.com/987192", }, { category: "self", summary: "SUSE Bug 987333", url: "https://bugzilla.suse.com/987333", }, { category: "self", summary: "SUSE Bug 987542", url: "https://bugzilla.suse.com/987542", }, { category: "self", summary: "SUSE Bug 987565", url: "https://bugzilla.suse.com/987565", }, { category: "self", summary: "SUSE Bug 987621", url: "https://bugzilla.suse.com/987621", }, { category: "self", summary: "SUSE Bug 987805", url: "https://bugzilla.suse.com/987805", }, { category: "self", summary: "SUSE Bug 988440", url: "https://bugzilla.suse.com/988440", }, { category: "self", summary: "SUSE Bug 988617", url: "https://bugzilla.suse.com/988617", }, { category: "self", summary: "SUSE Bug 988715", url: "https://bugzilla.suse.com/988715", }, { category: "self", summary: "SUSE Bug 989152", url: "https://bugzilla.suse.com/989152", }, { category: "self", summary: "SUSE Bug 989953", url: "https://bugzilla.suse.com/989953", }, { category: "self", summary: "SUSE Bug 990245", url: "https://bugzilla.suse.com/990245", }, { category: "self", summary: "SUSE Bug 991247", url: "https://bugzilla.suse.com/991247", }, { category: "self", summary: "SUSE Bug 991608", url: "https://bugzilla.suse.com/991608", }, { category: "self", summary: "SUSE Bug 991665", url: "https://bugzilla.suse.com/991665", }, { category: "self", summary: "SUSE Bug 992244", url: "https://bugzilla.suse.com/992244", }, { category: "self", summary: "SUSE Bug 992555", url: "https://bugzilla.suse.com/992555", }, { category: "self", summary: "SUSE Bug 992591", url: "https://bugzilla.suse.com/992591", }, { category: "self", summary: "SUSE Bug 992593", url: "https://bugzilla.suse.com/992593", }, { category: "self", summary: "SUSE Bug 992712", url: "https://bugzilla.suse.com/992712", }, { category: "self", summary: "SUSE Bug 993392", url: "https://bugzilla.suse.com/993392", }, { category: "self", summary: "SUSE Bug 993841", url: "https://bugzilla.suse.com/993841", }, { category: "self", summary: "SUSE Bug 993890", url: "https://bugzilla.suse.com/993890", }, { category: "self", summary: "SUSE Bug 993891", url: "https://bugzilla.suse.com/993891", }, { category: "self", summary: "SUSE Bug 994296", url: "https://bugzilla.suse.com/994296", }, { category: "self", summary: "SUSE Bug 994438", url: "https://bugzilla.suse.com/994438", }, { category: "self", summary: "SUSE Bug 994520", url: "https://bugzilla.suse.com/994520", }, { category: "self", summary: "SUSE Bug 994748", url: "https://bugzilla.suse.com/994748", }, { category: "self", summary: "SUSE Bug 995153", url: "https://bugzilla.suse.com/995153", }, { category: "self", summary: "SUSE Bug 995968", url: "https://bugzilla.suse.com/995968", }, { category: "self", summary: "SUSE Bug 996664", url: "https://bugzilla.suse.com/996664", }, { category: "self", summary: "SUSE Bug 997059", url: "https://bugzilla.suse.com/997059", }, { category: "self", summary: "SUSE Bug 997299", url: "https://bugzilla.suse.com/997299", }, { category: "self", summary: "SUSE Bug 997708", url: "https://bugzilla.suse.com/997708", }, { category: "self", summary: "SUSE Bug 997896", url: "https://bugzilla.suse.com/997896", }, { category: "self", summary: "SUSE Bug 998689", url: "https://bugzilla.suse.com/998689", }, { category: "self", summary: "SUSE Bug 998795", url: "https://bugzilla.suse.com/998795", }, { category: "self", summary: "SUSE Bug 998825", url: "https://bugzilla.suse.com/998825", }, { category: "self", summary: "SUSE Bug 999577", url: "https://bugzilla.suse.com/999577", }, { category: "self", summary: "SUSE Bug 999584", url: "https://bugzilla.suse.com/999584", }, { category: "self", summary: "SUSE Bug 999600", url: "https://bugzilla.suse.com/999600", }, { category: "self", summary: "SUSE Bug 999779", url: "https://bugzilla.suse.com/999779", }, { category: "self", summary: "SUSE Bug 999907", url: "https://bugzilla.suse.com/999907", }, { category: "self", summary: "SUSE Bug 999932", url: "https://bugzilla.suse.com/999932", }, { category: "self", summary: "SUSE CVE CVE-2015-8956 page", url: "https://www.suse.com/security/cve/CVE-2015-8956/", }, { category: "self", summary: "SUSE CVE CVE-2016-5696 page", url: "https://www.suse.com/security/cve/CVE-2016-5696/", }, { category: "self", summary: "SUSE CVE CVE-2016-6130 page", url: "https://www.suse.com/security/cve/CVE-2016-6130/", }, { category: "self", summary: "SUSE CVE CVE-2016-6327 page", url: "https://www.suse.com/security/cve/CVE-2016-6327/", }, { category: "self", summary: "SUSE CVE CVE-2016-6480 page", url: "https://www.suse.com/security/cve/CVE-2016-6480/", }, { category: "self", summary: "SUSE CVE CVE-2016-6828 page", url: "https://www.suse.com/security/cve/CVE-2016-6828/", }, { category: "self", summary: "SUSE CVE CVE-2016-7042 page", url: "https://www.suse.com/security/cve/CVE-2016-7042/", }, { category: "self", summary: "SUSE CVE CVE-2016-7097 page", url: "https://www.suse.com/security/cve/CVE-2016-7097/", }, { category: "self", summary: "SUSE CVE CVE-2016-7425 page", url: "https://www.suse.com/security/cve/CVE-2016-7425/", }, { category: "self", summary: "SUSE CVE CVE-2016-8658 page", url: "https://www.suse.com/security/cve/CVE-2016-8658/", }, { category: "self", summary: "SUSE CVE CVE-2016-8666 page", url: "https://www.suse.com/security/cve/CVE-2016-8666/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2016-11-25T12:49:49Z", generator: { date: "2016-11-25T12:49:49Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:2912-1", initial_release_date: "2016-11-25T12:49:49Z", revision_history: [ { date: "2016-11-25T12:49:49Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-3.12.67-60.64.18.1.noarch", product: { name: "kernel-devel-3.12.67-60.64.18.1.noarch", product_id: "kernel-devel-3.12.67-60.64.18.1.noarch", }, }, { category: "product_version", name: "kernel-macros-3.12.67-60.64.18.1.noarch", product: { name: "kernel-macros-3.12.67-60.64.18.1.noarch", product_id: "kernel-macros-3.12.67-60.64.18.1.noarch", }, }, { category: "product_version", name: "kernel-source-3.12.67-60.64.18.1.noarch", product: { name: "kernel-source-3.12.67-60.64.18.1.noarch", product_id: "kernel-source-3.12.67-60.64.18.1.noarch", }, }, { category: "product_version", name: "kernel-docs-3.12.67-60.64.18.3.noarch", product: { name: "kernel-docs-3.12.67-60.64.18.3.noarch", product_id: "kernel-docs-3.12.67-60.64.18.3.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-obs-build-3.12.67-60.64.18.1.ppc64le", product: { name: "kernel-obs-build-3.12.67-60.64.18.1.ppc64le", product_id: "kernel-obs-build-3.12.67-60.64.18.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-3.12.67-60.64.18.1.ppc64le", product: { name: "kernel-default-3.12.67-60.64.18.1.ppc64le", product_id: "kernel-default-3.12.67-60.64.18.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-3.12.67-60.64.18.1.ppc64le", product: { name: "kernel-default-base-3.12.67-60.64.18.1.ppc64le", product_id: "kernel-default-base-3.12.67-60.64.18.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-3.12.67-60.64.18.1.ppc64le", product: { name: "kernel-default-devel-3.12.67-60.64.18.1.ppc64le", product_id: "kernel-default-devel-3.12.67-60.64.18.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-3.12.67-60.64.18.1.ppc64le", product: { name: "kernel-syms-3.12.67-60.64.18.1.ppc64le", product_id: "kernel-syms-3.12.67-60.64.18.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-obs-build-3.12.67-60.64.18.1.s390x", product: { name: "kernel-obs-build-3.12.67-60.64.18.1.s390x", product_id: "kernel-obs-build-3.12.67-60.64.18.1.s390x", }, }, { category: "product_version", name: "kernel-default-3.12.67-60.64.18.1.s390x", product: { name: "kernel-default-3.12.67-60.64.18.1.s390x", product_id: "kernel-default-3.12.67-60.64.18.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.12.67-60.64.18.1.s390x", product: { name: "kernel-default-base-3.12.67-60.64.18.1.s390x", product_id: "kernel-default-base-3.12.67-60.64.18.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.12.67-60.64.18.1.s390x", product: { name: "kernel-default-devel-3.12.67-60.64.18.1.s390x", product_id: "kernel-default-devel-3.12.67-60.64.18.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.12.67-60.64.18.1.s390x", product: { name: "kernel-default-man-3.12.67-60.64.18.1.s390x", product_id: "kernel-default-man-3.12.67-60.64.18.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.12.67-60.64.18.1.s390x", product: { name: "kernel-syms-3.12.67-60.64.18.1.s390x", product_id: "kernel-syms-3.12.67-60.64.18.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-default-3.12.67-60.64.18.1.x86_64", product_id: "kernel-default-3.12.67-60.64.18.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-default-devel-3.12.67-60.64.18.1.x86_64", product_id: "kernel-default-devel-3.12.67-60.64.18.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-default-extra-3.12.67-60.64.18.1.x86_64", product_id: "kernel-default-extra-3.12.67-60.64.18.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-syms-3.12.67-60.64.18.1.x86_64", product_id: "kernel-syms-3.12.67-60.64.18.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-xen-3.12.67-60.64.18.1.x86_64", product_id: "kernel-xen-3.12.67-60.64.18.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-xen-devel-3.12.67-60.64.18.1.x86_64", product_id: "kernel-xen-devel-3.12.67-60.64.18.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", product: { name: "kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", product_id: "kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", product: { name: "kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", product_id: "kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", }, }, { category: "product_version", name: "kernel-ec2-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-ec2-3.12.67-60.64.18.1.x86_64", product_id: "kernel-ec2-3.12.67-60.64.18.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", product_id: "kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", product_id: "kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-obs-build-3.12.67-60.64.18.1.x86_64", product_id: "kernel-obs-build-3.12.67-60.64.18.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-default-base-3.12.67-60.64.18.1.x86_64", product_id: "kernel-default-base-3.12.67-60.64.18.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.12.67-60.64.18.1.x86_64", product: { name: "kernel-xen-base-3.12.67-60.64.18.1.x86_64", product_id: "kernel-xen-base-3.12.67-60.64.18.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP1", product: { name: "SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12", product: { name: "SUSE Linux Enterprise Live Patching 12", product_id: "SUSE Linux Enterprise Live Patching 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 12", product: { name: "SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP1", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1", product: { name: "SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP1", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP1", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-default-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-default-devel-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-default-extra-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", }, product_reference: "kernel-devel-3.12.67-60.64.18.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", }, product_reference: "kernel-macros-3.12.67-60.64.18.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", }, product_reference: "kernel-source-3.12.67-60.64.18.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-syms-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-xen-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", product_id: "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", }, product_reference: "kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", product_id: "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", }, product_reference: "kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-ec2-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-extra-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-3.12.67-60.64.18.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", }, product_reference: "kernel-docs-3.12.67-60.64.18.3.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", }, product_reference: "kernel-obs-build-3.12.67-60.64.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", }, product_reference: "kernel-obs-build-3.12.67-60.64.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-obs-build-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", }, product_reference: "kernel-default-3.12.67-60.64.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", }, product_reference: "kernel-default-3.12.67-60.64.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-default-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", }, product_reference: "kernel-default-base-3.12.67-60.64.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", }, product_reference: "kernel-default-base-3.12.67-60.64.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-default-base-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", }, product_reference: "kernel-default-devel-3.12.67-60.64.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", }, product_reference: "kernel-default-devel-3.12.67-60.64.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-default-devel-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", }, product_reference: "kernel-default-man-3.12.67-60.64.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", }, product_reference: "kernel-devel-3.12.67-60.64.18.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", }, product_reference: "kernel-macros-3.12.67-60.64.18.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", }, product_reference: "kernel-source-3.12.67-60.64.18.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", }, product_reference: "kernel-syms-3.12.67-60.64.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", }, product_reference: "kernel-syms-3.12.67-60.64.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-syms-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-xen-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-xen-base-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", }, product_reference: "kernel-default-3.12.67-60.64.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", }, product_reference: "kernel-default-3.12.67-60.64.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-default-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", }, product_reference: "kernel-default-base-3.12.67-60.64.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", }, product_reference: "kernel-default-base-3.12.67-60.64.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-default-base-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", }, product_reference: "kernel-default-devel-3.12.67-60.64.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", }, product_reference: "kernel-default-devel-3.12.67-60.64.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-default-devel-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", }, product_reference: "kernel-default-man-3.12.67-60.64.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", }, product_reference: "kernel-devel-3.12.67-60.64.18.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", }, product_reference: "kernel-macros-3.12.67-60.64.18.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", }, product_reference: "kernel-source-3.12.67-60.64.18.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", }, product_reference: "kernel-syms-3.12.67-60.64.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", }, product_reference: "kernel-syms-3.12.67-60.64.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-syms-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-xen-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-xen-base-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", }, product_reference: "kernel-default-extra-3.12.67-60.64.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2015-8956", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8956", }, ], notes: [ { category: "general", text: "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8956", url: "https://www.suse.com/security/cve/CVE-2015-8956", }, { category: "external", summary: "SUSE Bug 1003925 for CVE-2015-8956", url: "https://bugzilla.suse.com/1003925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-11-25T12:49:49Z", details: "moderate", }, ], title: "CVE-2015-8956", }, { cve: "CVE-2016-5696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5696", }, ], notes: [ { category: "general", text: "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5696", url: "https://www.suse.com/security/cve/CVE-2016-5696", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-5696", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1175721 for CVE-2016-5696", url: "https://bugzilla.suse.com/1175721", }, { category: "external", summary: "SUSE Bug 989152 for CVE-2016-5696", url: "https://bugzilla.suse.com/989152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-11-25T12:49:49Z", details: "moderate", }, ], title: "CVE-2016-5696", }, { cve: "CVE-2016-6130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6130", }, ], notes: [ { category: "general", text: "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6130", url: "https://www.suse.com/security/cve/CVE-2016-6130", }, { category: "external", summary: "SUSE Bug 987542 for CVE-2016-6130", url: "https://bugzilla.suse.com/987542", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-11-25T12:49:49Z", details: "moderate", }, ], title: "CVE-2016-6130", }, { cve: "CVE-2016-6327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6327", }, ], notes: [ { category: "general", text: "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6327", url: "https://www.suse.com/security/cve/CVE-2016-6327", }, { category: "external", summary: "SUSE Bug 994748 for CVE-2016-6327", url: "https://bugzilla.suse.com/994748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-11-25T12:49:49Z", details: "moderate", }, ], title: "CVE-2016-6327", }, { cve: "CVE-2016-6480", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6480", }, ], notes: [ { category: "general", text: "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6480", url: "https://www.suse.com/security/cve/CVE-2016-6480", }, { category: "external", summary: "SUSE Bug 1004418 for CVE-2016-6480", url: "https://bugzilla.suse.com/1004418", }, { category: "external", summary: "SUSE Bug 991608 for CVE-2016-6480", url: "https://bugzilla.suse.com/991608", }, { category: "external", summary: "SUSE Bug 991667 for CVE-2016-6480", url: "https://bugzilla.suse.com/991667", }, { category: "external", summary: "SUSE Bug 992568 for CVE-2016-6480", url: "https://bugzilla.suse.com/992568", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-11-25T12:49:49Z", details: "moderate", }, ], title: "CVE-2016-6480", }, { cve: "CVE-2016-6828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6828", }, ], notes: [ { category: "general", text: "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6828", url: "https://www.suse.com/security/cve/CVE-2016-6828", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-6828", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 994296 for CVE-2016-6828", url: "https://bugzilla.suse.com/994296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-11-25T12:49:49Z", details: "moderate", }, ], title: "CVE-2016-6828", }, { cve: "CVE-2016-7042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7042", }, ], notes: [ { category: "general", text: "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7042", url: "https://www.suse.com/security/cve/CVE-2016-7042", }, { category: "external", summary: "SUSE Bug 1004517 for CVE-2016-7042", url: "https://bugzilla.suse.com/1004517", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-11-25T12:49:49Z", details: "moderate", }, ], title: "CVE-2016-7042", }, { cve: "CVE-2016-7097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7097", }, ], notes: [ { category: "general", text: "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7097", url: "https://www.suse.com/security/cve/CVE-2016-7097", }, { category: "external", summary: "SUSE Bug 1021258 for CVE-2016-7097", url: "https://bugzilla.suse.com/1021258", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-7097", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-7097", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 995968 for CVE-2016-7097", url: "https://bugzilla.suse.com/995968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-11-25T12:49:49Z", details: "low", }, ], title: "CVE-2016-7097", }, { cve: "CVE-2016-7425", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7425", }, ], notes: [ { category: "general", text: "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7425", url: "https://www.suse.com/security/cve/CVE-2016-7425", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7425", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 999932 for CVE-2016-7425", url: "https://bugzilla.suse.com/999932", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-11-25T12:49:49Z", details: "moderate", }, ], title: "CVE-2016-7425", }, { cve: "CVE-2016-8658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8658", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8658", url: "https://www.suse.com/security/cve/CVE-2016-8658", }, { category: "external", summary: "SUSE Bug 1004462 for CVE-2016-8658", url: "https://bugzilla.suse.com/1004462", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-11-25T12:49:49Z", details: "moderate", }, ], title: "CVE-2016-8658", }, { cve: "CVE-2016-8666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8666", }, ], notes: [ { category: "general", text: "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8666", url: "https://www.suse.com/security/cve/CVE-2016-8666", }, { category: "external", summary: "SUSE Bug 1001486 for CVE-2016-8666", url: "https://bugzilla.suse.com/1001486", }, { category: "external", summary: "SUSE Bug 1001487 for CVE-2016-8666", url: "https://bugzilla.suse.com/1001487", }, { category: "external", summary: "SUSE Bug 1003964 for CVE-2016-8666", url: "https://bugzilla.suse.com/1003964", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-11-25T12:49:49Z", details: "important", }, ], title: "CVE-2016-8666", }, ], }
suse-su-2017:0471-1
Vulnerability from csaf_suse
Published
2017-02-15 16:20
Modified
2017-02-15 16:20
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to 3.12.61 to receive various security and bugfixes.
The following feature was implemented:
- The ext2 filesystem got reenabled and supported to allow support for 'XIP' (Execute In Place) (FATE#320805).
The following security bugs were fixed:
- CVE-2017-5551: The tmpfs filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#1021258).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. A user/process inside guest could have used this flaw to crash the guest resulting in DoS or potentially escalate their privileges inside guest. (bsc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).
- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a 'state machine confusion bug (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misused the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation (bnc#994748).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362 bnc#986365).
- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).
- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
The following non-security bugs were fixed:
- base: make module_create_drivers_dir race-free (bnc#983977).
- btrfs-8448-improve-performance-on-fsync-against-new-inode.patch: Disable (bsc#981597).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: be more precise on errors when getting an inode from disk (bsc#981038).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- ext4: Fixup handling for custom configs in tuning.
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257)
- ipv6: KABI workaround for ipv6: add complete rcu protection around np->opt.
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- kabi: reintroduce sk_filter (kabi).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- modsign: Print appropriate status message when accessing UEFI variable (bsc#958606).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).
- netfilter: allow logging fron non-init netns (bsc#970083).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- pci/aer: Clear error status registers during enumeration and restore (bsc#985978).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- reiserfs: fix race in prealloc discard (bsc#987576).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: Increase REPORT_LUNS timeout (bsc#982282).
- series.conf: move stray netfilter patches to the right section
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- supported.conf: Add ext2
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tty: audit: Fix audit source (bsc#1016482).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- xen: Fix refcnt regression in xen netback introduced by changes made for bug#881008 (bnc#978094)
- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: silence warnings in switch (bnc#991665).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2017-247,SUSE-SLE-SAP-12-2017-247,SUSE-SLE-SERVER-12-2017-247
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to 3.12.61 to receive various security and bugfixes.\n\nThe following feature was implemented:\n\n- The ext2 filesystem got reenabled and supported to allow support for 'XIP' (Execute In Place) (FATE#320805).\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-5551: The tmpfs filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#1021258).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. A user/process inside guest could have used this flaw to crash the guest resulting in DoS or potentially escalate their privileges inside guest. (bsc#1020602).\n- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).\n- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).\n- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a 'state machine confusion bug (bnc#1007197).\n- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misused the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation (bnc#994748).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).\n- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362 bnc#986365).\n- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).\n- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n\nThe following non-security bugs were fixed:\n\n- base: make module_create_drivers_dir race-free (bnc#983977).\n- btrfs-8448-improve-performance-on-fsync-against-new-inode.patch: Disable (bsc#981597).\n- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: be more precise on errors when getting an inode from disk (bsc#981038).\n- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- btrfs: fix relocation incorrectly dropping data references (bsc#990384).\n- btrfs: handle quota reserve failure properly (bsc#1005666).\n- btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).\n- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709).\n- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)\n- ext4: Add parameter for tuning handling of ext2 (bsc#976195).\n- ext4: Fixup handling for custom configs in tuning.\n- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257)\n- ipv6: KABI workaround for ipv6: add complete rcu protection around np->opt.\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- kabi: reintroduce sk_filter (kabi).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296).\n- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296).\n- kgr: ignore zombie tasks during the patching (bnc#1008979).\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- modsign: Print appropriate status message when accessing UEFI variable (bsc#958606).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).\n- netfilter: allow logging fron non-init netns (bsc#970083).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- pci/aer: Clear error status registers during enumeration and restore (bsc#985978).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: Increase REPORT_LUNS timeout (bsc#982282).\n- series.conf: move stray netfilter patches to the right section\n- squashfs3: properly handle dir_emit() failures (bsc#998795).\n- supported.conf: Add ext2\n- timers: Use proper base migration in add_timer_on() (bnc#993392).\n- tty: audit: Fix audit source (bsc#1016482).\n- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- xen: Fix refcnt regression in xen netback introduced by changes made for bug#881008 (bnc#978094)\n- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).\n- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).\n- xfs: fix premature enospc on inode allocation (bsc#984148).\n- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).\n- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).\n- xfs: refactor xlog_recover_process_data() (bsc#1019300).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- xhci: silence warnings in switch (bnc#991665).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Public-Cloud-12-2017-247,SUSE-SLE-SAP-12-2017-247,SUSE-SLE-SERVER-12-2017-247", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0471-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:0471-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:0471-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html", }, { category: "self", summary: "SUSE Bug 1003153", url: "https://bugzilla.suse.com/1003153", }, { category: "self", summary: "SUSE Bug 1003925", url: "https://bugzilla.suse.com/1003925", }, { category: "self", summary: "SUSE Bug 1004462", url: "https://bugzilla.suse.com/1004462", }, { category: "self", summary: "SUSE Bug 1004517", url: "https://bugzilla.suse.com/1004517", }, { category: "self", summary: "SUSE Bug 1005666", url: "https://bugzilla.suse.com/1005666", }, { category: "self", summary: "SUSE Bug 1007197", url: "https://bugzilla.suse.com/1007197", }, { category: "self", summary: "SUSE Bug 1008833", url: "https://bugzilla.suse.com/1008833", }, { category: "self", summary: "SUSE Bug 1008979", url: "https://bugzilla.suse.com/1008979", }, { category: "self", summary: "SUSE Bug 1009969", url: "https://bugzilla.suse.com/1009969", }, { category: "self", summary: "SUSE Bug 1010040", url: "https://bugzilla.suse.com/1010040", }, { category: "self", summary: "SUSE Bug 1010475", url: "https://bugzilla.suse.com/1010475", }, { category: "self", summary: "SUSE Bug 1010478", url: "https://bugzilla.suse.com/1010478", }, { category: "self", summary: "SUSE Bug 1010501", url: "https://bugzilla.suse.com/1010501", }, { category: "self", summary: "SUSE Bug 1010502", url: "https://bugzilla.suse.com/1010502", }, { category: "self", summary: "SUSE Bug 1010507", url: "https://bugzilla.suse.com/1010507", }, { category: "self", summary: "SUSE Bug 1010612", url: "https://bugzilla.suse.com/1010612", }, { category: "self", summary: "SUSE Bug 1010711", url: "https://bugzilla.suse.com/1010711", }, { category: "self", summary: "SUSE Bug 1010716", url: "https://bugzilla.suse.com/1010716", }, { category: "self", summary: "SUSE Bug 1011820", url: "https://bugzilla.suse.com/1011820", }, { category: "self", summary: "SUSE Bug 1012422", url: "https://bugzilla.suse.com/1012422", }, { category: "self", summary: "SUSE Bug 1013038", url: "https://bugzilla.suse.com/1013038", }, { category: "self", summary: "SUSE Bug 1013531", url: "https://bugzilla.suse.com/1013531", }, { category: "self", summary: "SUSE Bug 1013540", url: "https://bugzilla.suse.com/1013540", }, { category: "self", summary: "SUSE Bug 1013542", url: "https://bugzilla.suse.com/1013542", }, { category: "self", summary: "SUSE Bug 1014746", url: "https://bugzilla.suse.com/1014746", }, { category: "self", summary: "SUSE Bug 1016482", url: "https://bugzilla.suse.com/1016482", }, { category: "self", summary: "SUSE Bug 1017410", url: "https://bugzilla.suse.com/1017410", }, { category: "self", summary: "SUSE Bug 1017589", url: "https://bugzilla.suse.com/1017589", }, { category: "self", summary: "SUSE Bug 1017710", url: "https://bugzilla.suse.com/1017710", }, { category: "self", summary: "SUSE Bug 1019300", url: "https://bugzilla.suse.com/1019300", }, { category: "self", summary: "SUSE Bug 1019851", url: "https://bugzilla.suse.com/1019851", }, { category: "self", summary: "SUSE Bug 1020602", url: "https://bugzilla.suse.com/1020602", }, { category: "self", summary: "SUSE Bug 1021258", url: "https://bugzilla.suse.com/1021258", }, { category: "self", summary: "SUSE Bug 881008", url: "https://bugzilla.suse.com/881008", }, { category: "self", summary: "SUSE Bug 915183", url: "https://bugzilla.suse.com/915183", }, { category: "self", summary: "SUSE Bug 958606", url: "https://bugzilla.suse.com/958606", }, { category: "self", summary: "SUSE Bug 961257", url: "https://bugzilla.suse.com/961257", }, { category: "self", summary: "SUSE Bug 970083", url: "https://bugzilla.suse.com/970083", }, { category: "self", summary: "SUSE Bug 971989", url: "https://bugzilla.suse.com/971989", }, { category: "self", summary: "SUSE Bug 976195", url: "https://bugzilla.suse.com/976195", }, { category: "self", summary: "SUSE Bug 978094", url: "https://bugzilla.suse.com/978094", }, { category: "self", summary: "SUSE Bug 980371", url: "https://bugzilla.suse.com/980371", }, { category: "self", summary: "SUSE Bug 980560", url: "https://bugzilla.suse.com/980560", }, { category: "self", summary: "SUSE Bug 981038", url: "https://bugzilla.suse.com/981038", }, { category: "self", summary: "SUSE Bug 981597", url: "https://bugzilla.suse.com/981597", }, { category: "self", summary: "SUSE Bug 981709", url: "https://bugzilla.suse.com/981709", }, { category: "self", summary: "SUSE Bug 982282", url: "https://bugzilla.suse.com/982282", }, { category: "self", summary: "SUSE Bug 982544", url: "https://bugzilla.suse.com/982544", }, { category: "self", summary: "SUSE Bug 983619", url: "https://bugzilla.suse.com/983619", }, { category: "self", summary: "SUSE Bug 983721", url: "https://bugzilla.suse.com/983721", }, { category: "self", summary: "SUSE Bug 983977", url: "https://bugzilla.suse.com/983977", }, { category: "self", summary: "SUSE Bug 984148", url: "https://bugzilla.suse.com/984148", }, { category: "self", summary: "SUSE Bug 984419", url: "https://bugzilla.suse.com/984419", }, { category: "self", summary: "SUSE Bug 984755", url: "https://bugzilla.suse.com/984755", }, { category: "self", summary: "SUSE Bug 985978", url: "https://bugzilla.suse.com/985978", }, { category: "self", summary: "SUSE Bug 986362", url: "https://bugzilla.suse.com/986362", }, { category: "self", summary: "SUSE Bug 986365", url: "https://bugzilla.suse.com/986365", }, { category: "self", summary: "SUSE Bug 986445", url: "https://bugzilla.suse.com/986445", }, { category: "self", summary: "SUSE Bug 986569", url: "https://bugzilla.suse.com/986569", }, { category: "self", summary: "SUSE Bug 986572", url: "https://bugzilla.suse.com/986572", }, { category: "self", summary: "SUSE Bug 986811", url: "https://bugzilla.suse.com/986811", }, { category: "self", summary: "SUSE Bug 986941", url: "https://bugzilla.suse.com/986941", }, { category: "self", summary: "SUSE Bug 987542", url: "https://bugzilla.suse.com/987542", }, { category: "self", summary: "SUSE Bug 987565", url: "https://bugzilla.suse.com/987565", }, { category: "self", summary: "SUSE Bug 987576", url: "https://bugzilla.suse.com/987576", }, { category: "self", summary: "SUSE Bug 989152", url: "https://bugzilla.suse.com/989152", }, { category: "self", summary: "SUSE Bug 990384", url: "https://bugzilla.suse.com/990384", }, { category: "self", summary: "SUSE Bug 991608", url: "https://bugzilla.suse.com/991608", }, { category: "self", summary: "SUSE Bug 991665", url: "https://bugzilla.suse.com/991665", }, { category: "self", summary: "SUSE Bug 993392", url: "https://bugzilla.suse.com/993392", }, { category: "self", summary: "SUSE Bug 993890", url: "https://bugzilla.suse.com/993890", }, { category: "self", summary: "SUSE Bug 993891", url: "https://bugzilla.suse.com/993891", }, { category: "self", summary: "SUSE Bug 994296", url: "https://bugzilla.suse.com/994296", }, { category: "self", summary: "SUSE Bug 994748", url: "https://bugzilla.suse.com/994748", }, { category: "self", summary: "SUSE Bug 994881", url: "https://bugzilla.suse.com/994881", }, { category: "self", summary: "SUSE Bug 995968", url: "https://bugzilla.suse.com/995968", }, { category: "self", summary: "SUSE Bug 997708", url: "https://bugzilla.suse.com/997708", }, { category: "self", summary: "SUSE Bug 998795", url: "https://bugzilla.suse.com/998795", }, { category: "self", summary: "SUSE Bug 999584", url: "https://bugzilla.suse.com/999584", }, { category: "self", summary: "SUSE Bug 999600", url: "https://bugzilla.suse.com/999600", }, { category: "self", summary: "SUSE Bug 999932", url: "https://bugzilla.suse.com/999932", }, { category: "self", summary: "SUSE Bug 999943", url: "https://bugzilla.suse.com/999943", }, { category: "self", summary: "SUSE CVE CVE-2014-9904 page", url: "https://www.suse.com/security/cve/CVE-2014-9904/", }, { category: "self", summary: "SUSE CVE CVE-2015-8956 page", url: "https://www.suse.com/security/cve/CVE-2015-8956/", }, { category: "self", summary: "SUSE CVE CVE-2015-8962 page", url: "https://www.suse.com/security/cve/CVE-2015-8962/", }, { category: "self", summary: "SUSE CVE CVE-2015-8963 page", url: "https://www.suse.com/security/cve/CVE-2015-8963/", }, { category: "self", summary: "SUSE CVE CVE-2015-8964 page", url: "https://www.suse.com/security/cve/CVE-2015-8964/", }, { category: "self", summary: "SUSE CVE CVE-2016-10088 page", url: "https://www.suse.com/security/cve/CVE-2016-10088/", }, { category: "self", summary: "SUSE CVE CVE-2016-4470 page", url: "https://www.suse.com/security/cve/CVE-2016-4470/", }, { category: "self", summary: "SUSE CVE CVE-2016-4997 page", url: "https://www.suse.com/security/cve/CVE-2016-4997/", }, { category: "self", summary: "SUSE CVE CVE-2016-5696 page", url: "https://www.suse.com/security/cve/CVE-2016-5696/", }, { category: "self", summary: "SUSE CVE CVE-2016-5828 page", url: "https://www.suse.com/security/cve/CVE-2016-5828/", }, { category: "self", summary: "SUSE CVE CVE-2016-5829 page", url: "https://www.suse.com/security/cve/CVE-2016-5829/", }, { category: "self", summary: "SUSE CVE CVE-2016-6130 page", url: "https://www.suse.com/security/cve/CVE-2016-6130/", }, { category: "self", summary: "SUSE CVE CVE-2016-6327 page", url: "https://www.suse.com/security/cve/CVE-2016-6327/", }, { category: "self", summary: "SUSE CVE CVE-2016-6480 page", url: "https://www.suse.com/security/cve/CVE-2016-6480/", }, { category: "self", summary: "SUSE CVE CVE-2016-6828 page", url: "https://www.suse.com/security/cve/CVE-2016-6828/", }, { category: "self", summary: "SUSE CVE CVE-2016-7042 page", url: "https://www.suse.com/security/cve/CVE-2016-7042/", }, { category: "self", summary: "SUSE CVE CVE-2016-7097 page", url: "https://www.suse.com/security/cve/CVE-2016-7097/", }, { category: "self", summary: "SUSE CVE CVE-2016-7425 page", url: "https://www.suse.com/security/cve/CVE-2016-7425/", }, { category: "self", summary: "SUSE CVE CVE-2016-7910 page", url: "https://www.suse.com/security/cve/CVE-2016-7910/", }, { category: "self", summary: "SUSE CVE CVE-2016-7911 page", url: "https://www.suse.com/security/cve/CVE-2016-7911/", }, { category: "self", summary: "SUSE CVE CVE-2016-7913 page", url: "https://www.suse.com/security/cve/CVE-2016-7913/", }, { category: "self", summary: "SUSE CVE CVE-2016-7914 page", url: "https://www.suse.com/security/cve/CVE-2016-7914/", }, { category: "self", summary: "SUSE CVE CVE-2016-8399 page", url: "https://www.suse.com/security/cve/CVE-2016-8399/", }, { category: "self", summary: "SUSE CVE CVE-2016-8633 page", url: "https://www.suse.com/security/cve/CVE-2016-8633/", }, { category: "self", summary: "SUSE CVE CVE-2016-8645 page", url: "https://www.suse.com/security/cve/CVE-2016-8645/", }, { category: "self", summary: "SUSE CVE CVE-2016-8658 page", url: "https://www.suse.com/security/cve/CVE-2016-8658/", }, { category: "self", summary: "SUSE CVE CVE-2016-9083 page", url: "https://www.suse.com/security/cve/CVE-2016-9083/", }, { category: "self", summary: "SUSE CVE CVE-2016-9084 page", url: "https://www.suse.com/security/cve/CVE-2016-9084/", }, { category: "self", summary: "SUSE CVE CVE-2016-9756 page", url: "https://www.suse.com/security/cve/CVE-2016-9756/", }, { category: "self", summary: "SUSE CVE CVE-2016-9793 page", url: "https://www.suse.com/security/cve/CVE-2016-9793/", }, { category: "self", summary: "SUSE CVE CVE-2016-9806 page", url: "https://www.suse.com/security/cve/CVE-2016-9806/", }, { category: "self", summary: "SUSE CVE CVE-2017-2583 page", url: "https://www.suse.com/security/cve/CVE-2017-2583/", }, { category: "self", summary: "SUSE CVE CVE-2017-2584 page", url: "https://www.suse.com/security/cve/CVE-2017-2584/", }, { category: "self", summary: "SUSE CVE CVE-2017-5551 page", url: "https://www.suse.com/security/cve/CVE-2017-5551/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2017-02-15T16:20:32Z", generator: { date: "2017-02-15T16:20:32Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:0471-1", initial_release_date: "2017-02-15T16:20:32Z", revision_history: [ { date: "2017-02-15T16:20:32Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-3.12.61-52.66.1.noarch", product: { name: "kernel-devel-3.12.61-52.66.1.noarch", product_id: "kernel-devel-3.12.61-52.66.1.noarch", }, }, { category: "product_version", name: "kernel-macros-3.12.61-52.66.1.noarch", product: { name: "kernel-macros-3.12.61-52.66.1.noarch", product_id: "kernel-macros-3.12.61-52.66.1.noarch", }, }, { category: "product_version", name: "kernel-source-3.12.61-52.66.1.noarch", product: { name: "kernel-source-3.12.61-52.66.1.noarch", product_id: "kernel-source-3.12.61-52.66.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-default-3.12.61-52.66.1.ppc64le", product: { name: "kernel-default-3.12.61-52.66.1.ppc64le", product_id: "kernel-default-3.12.61-52.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-3.12.61-52.66.1.ppc64le", product: { name: "kernel-default-base-3.12.61-52.66.1.ppc64le", product_id: "kernel-default-base-3.12.61-52.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-3.12.61-52.66.1.ppc64le", product: { name: "kernel-default-devel-3.12.61-52.66.1.ppc64le", product_id: "kernel-default-devel-3.12.61-52.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-3.12.61-52.66.1.ppc64le", product: { name: "kernel-syms-3.12.61-52.66.1.ppc64le", product_id: "kernel-syms-3.12.61-52.66.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-default-3.12.61-52.66.1.s390x", product: { name: "kernel-default-3.12.61-52.66.1.s390x", product_id: "kernel-default-3.12.61-52.66.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.12.61-52.66.1.s390x", product: { name: "kernel-default-base-3.12.61-52.66.1.s390x", product_id: "kernel-default-base-3.12.61-52.66.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.12.61-52.66.1.s390x", product: { name: "kernel-default-devel-3.12.61-52.66.1.s390x", product_id: "kernel-default-devel-3.12.61-52.66.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.12.61-52.66.1.s390x", product: { name: "kernel-default-man-3.12.61-52.66.1.s390x", product_id: "kernel-default-man-3.12.61-52.66.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.12.61-52.66.1.s390x", product: { name: "kernel-syms-3.12.61-52.66.1.s390x", product_id: "kernel-syms-3.12.61-52.66.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-ec2-3.12.61-52.66.1.x86_64", product: { name: "kernel-ec2-3.12.61-52.66.1.x86_64", product_id: "kernel-ec2-3.12.61-52.66.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.12.61-52.66.1.x86_64", product: { name: "kernel-ec2-devel-3.12.61-52.66.1.x86_64", product_id: "kernel-ec2-devel-3.12.61-52.66.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-extra-3.12.61-52.66.1.x86_64", product: { name: "kernel-ec2-extra-3.12.61-52.66.1.x86_64", product_id: "kernel-ec2-extra-3.12.61-52.66.1.x86_64", }, }, { category: "product_version", name: "kernel-default-3.12.61-52.66.1.x86_64", product: { name: "kernel-default-3.12.61-52.66.1.x86_64", product_id: "kernel-default-3.12.61-52.66.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.12.61-52.66.1.x86_64", product: { name: "kernel-default-base-3.12.61-52.66.1.x86_64", product_id: "kernel-default-base-3.12.61-52.66.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.12.61-52.66.1.x86_64", product: { name: "kernel-default-devel-3.12.61-52.66.1.x86_64", product_id: "kernel-default-devel-3.12.61-52.66.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.12.61-52.66.1.x86_64", product: { name: "kernel-syms-3.12.61-52.66.1.x86_64", product_id: "kernel-syms-3.12.61-52.66.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.12.61-52.66.1.x86_64", product: { name: "kernel-xen-3.12.61-52.66.1.x86_64", product_id: "kernel-xen-3.12.61-52.66.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.12.61-52.66.1.x86_64", product: { name: "kernel-xen-base-3.12.61-52.66.1.x86_64", product_id: "kernel-xen-base-3.12.61-52.66.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.12.61-52.66.1.x86_64", product: { name: "kernel-xen-devel-3.12.61-52.66.1.x86_64", product_id: "kernel-xen-devel-3.12.61-52.66.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", product: { name: "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", product_id: "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", product: { name: "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", product_id: "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 12", product: { name: "SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12-LTSS", product: { name: "SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-ec2-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-ec2-devel-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-extra-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-ec2-extra-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-default-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-default-base-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-default-devel-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", }, product_reference: "kernel-devel-3.12.61-52.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", }, product_reference: "kernel-macros-3.12.61-52.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", }, product_reference: "kernel-source-3.12.61-52.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-syms-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-xen-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-xen-base-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", }, product_reference: "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", }, product_reference: "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", }, product_reference: "kernel-default-3.12.61-52.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", }, product_reference: "kernel-default-3.12.61-52.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-default-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", }, product_reference: "kernel-default-base-3.12.61-52.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", }, product_reference: "kernel-default-base-3.12.61-52.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-default-base-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", }, product_reference: "kernel-default-devel-3.12.61-52.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", }, product_reference: "kernel-default-devel-3.12.61-52.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-default-devel-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", }, product_reference: "kernel-default-man-3.12.61-52.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", }, product_reference: "kernel-devel-3.12.61-52.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", }, product_reference: "kernel-macros-3.12.61-52.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", }, product_reference: "kernel-source-3.12.61-52.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", }, product_reference: "kernel-syms-3.12.61-52.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", }, product_reference: "kernel-syms-3.12.61-52.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-syms-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-xen-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-xen-base-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.61-52.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", }, product_reference: "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", }, product_reference: "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2014-9904", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9904", }, ], notes: [ { category: "general", text: "The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9904", url: "https://www.suse.com/security/cve/CVE-2014-9904", }, { category: "external", summary: "SUSE Bug 986811 for CVE-2014-9904", url: "https://bugzilla.suse.com/986811", }, { category: "external", summary: "SUSE Bug 986941 for CVE-2014-9904", url: "https://bugzilla.suse.com/986941", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2014-9904", }, { cve: "CVE-2015-8956", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8956", }, ], notes: [ { category: "general", text: "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8956", url: "https://www.suse.com/security/cve/CVE-2015-8956", }, { category: "external", summary: "SUSE Bug 1003925 for CVE-2015-8956", url: "https://bugzilla.suse.com/1003925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2015-8956", }, { cve: "CVE-2015-8962", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8962", }, ], notes: [ { category: "general", text: "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8962", url: "https://www.suse.com/security/cve/CVE-2015-8962", }, { category: "external", summary: "SUSE Bug 1010501 for CVE-2015-8962", url: "https://bugzilla.suse.com/1010501", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2015-8962", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2015-8962", }, { cve: "CVE-2015-8963", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8963", }, ], notes: [ { category: "general", text: "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8963", url: "https://www.suse.com/security/cve/CVE-2015-8963", }, { category: "external", summary: "SUSE Bug 1010502 for CVE-2015-8963", url: "https://bugzilla.suse.com/1010502", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2015-8963", }, { cve: "CVE-2015-8964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8964", }, ], notes: [ { category: "general", text: "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8964", url: "https://www.suse.com/security/cve/CVE-2015-8964", }, { category: "external", summary: "SUSE Bug 1010507 for CVE-2015-8964", url: "https://bugzilla.suse.com/1010507", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2015-8964", }, { cve: "CVE-2016-10088", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10088", }, ], notes: [ { category: "general", text: "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10088", url: "https://www.suse.com/security/cve/CVE-2016-10088", }, { category: "external", summary: "SUSE Bug 1013604 for CVE-2016-10088", url: "https://bugzilla.suse.com/1013604", }, { category: "external", summary: "SUSE Bug 1014271 for CVE-2016-10088", url: "https://bugzilla.suse.com/1014271", }, { category: "external", summary: "SUSE Bug 1017710 for CVE-2016-10088", url: "https://bugzilla.suse.com/1017710", }, { category: "external", summary: "SUSE Bug 1019079 for CVE-2016-10088", url: "https://bugzilla.suse.com/1019079", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-10088", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "important", }, ], title: "CVE-2016-10088", }, { cve: "CVE-2016-4470", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4470", }, ], notes: [ { category: "general", text: "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4470", url: "https://www.suse.com/security/cve/CVE-2016-4470", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4470", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 984755 for CVE-2016-4470", url: "https://bugzilla.suse.com/984755", }, { category: "external", summary: "SUSE Bug 984764 for CVE-2016-4470", url: "https://bugzilla.suse.com/984764", }, { category: "external", summary: "SUSE Bug 991651 for CVE-2016-4470", url: "https://bugzilla.suse.com/991651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-4470", }, { cve: "CVE-2016-4997", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4997", }, ], notes: [ { category: "general", text: "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4997", url: "https://www.suse.com/security/cve/CVE-2016-4997", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4997", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 986362 for CVE-2016-4997", url: "https://bugzilla.suse.com/986362", }, { category: "external", summary: "SUSE Bug 986365 for CVE-2016-4997", url: "https://bugzilla.suse.com/986365", }, { category: "external", summary: "SUSE Bug 986377 for CVE-2016-4997", url: "https://bugzilla.suse.com/986377", }, { category: "external", summary: "SUSE Bug 991651 for CVE-2016-4997", url: "https://bugzilla.suse.com/991651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "important", }, ], title: "CVE-2016-4997", }, { cve: "CVE-2016-5696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5696", }, ], notes: [ { category: "general", text: "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5696", url: "https://www.suse.com/security/cve/CVE-2016-5696", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-5696", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1175721 for CVE-2016-5696", url: "https://bugzilla.suse.com/1175721", }, { category: "external", summary: "SUSE Bug 989152 for CVE-2016-5696", url: "https://bugzilla.suse.com/989152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-5696", }, { cve: "CVE-2016-5828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5828", }, ], notes: [ { category: "general", text: "The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5828", url: "https://www.suse.com/security/cve/CVE-2016-5828", }, { category: "external", summary: "SUSE Bug 986569 for CVE-2016-5828", url: "https://bugzilla.suse.com/986569", }, { category: "external", summary: "SUSE Bug 991065 for CVE-2016-5828", url: "https://bugzilla.suse.com/991065", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-5828", }, { cve: "CVE-2016-5829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5829", }, ], notes: [ { category: "general", text: "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5829", url: "https://www.suse.com/security/cve/CVE-2016-5829", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2016-5829", url: "https://bugzilla.suse.com/1053919", }, { category: "external", summary: "SUSE Bug 1054127 for CVE-2016-5829", url: "https://bugzilla.suse.com/1054127", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-5829", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 986572 for CVE-2016-5829", url: "https://bugzilla.suse.com/986572", }, { category: "external", summary: "SUSE Bug 986573 for CVE-2016-5829", url: "https://bugzilla.suse.com/986573", }, { category: "external", summary: "SUSE Bug 991651 for CVE-2016-5829", url: "https://bugzilla.suse.com/991651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-5829", }, { cve: "CVE-2016-6130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6130", }, ], notes: [ { category: "general", text: "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6130", url: "https://www.suse.com/security/cve/CVE-2016-6130", }, { category: "external", summary: "SUSE Bug 987542 for CVE-2016-6130", url: "https://bugzilla.suse.com/987542", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-6130", }, { cve: "CVE-2016-6327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6327", }, ], notes: [ { category: "general", text: "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6327", url: "https://www.suse.com/security/cve/CVE-2016-6327", }, { category: "external", summary: "SUSE Bug 994748 for CVE-2016-6327", url: "https://bugzilla.suse.com/994748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-6327", }, { cve: "CVE-2016-6480", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6480", }, ], notes: [ { category: "general", text: "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6480", url: "https://www.suse.com/security/cve/CVE-2016-6480", }, { category: "external", summary: "SUSE Bug 1004418 for CVE-2016-6480", url: "https://bugzilla.suse.com/1004418", }, { category: "external", summary: "SUSE Bug 991608 for CVE-2016-6480", url: "https://bugzilla.suse.com/991608", }, { category: "external", summary: "SUSE Bug 991667 for CVE-2016-6480", url: "https://bugzilla.suse.com/991667", }, { category: "external", summary: "SUSE Bug 992568 for CVE-2016-6480", url: "https://bugzilla.suse.com/992568", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-6480", }, { cve: "CVE-2016-6828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6828", }, ], notes: [ { category: "general", text: "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6828", url: "https://www.suse.com/security/cve/CVE-2016-6828", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-6828", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 994296 for CVE-2016-6828", url: "https://bugzilla.suse.com/994296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-6828", }, { cve: "CVE-2016-7042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7042", }, ], notes: [ { category: "general", text: "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7042", url: "https://www.suse.com/security/cve/CVE-2016-7042", }, { category: "external", summary: "SUSE Bug 1004517 for CVE-2016-7042", url: "https://bugzilla.suse.com/1004517", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-7042", }, { cve: "CVE-2016-7097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7097", }, ], notes: [ { category: "general", text: "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7097", url: "https://www.suse.com/security/cve/CVE-2016-7097", }, { category: "external", summary: "SUSE Bug 1021258 for CVE-2016-7097", url: "https://bugzilla.suse.com/1021258", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-7097", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-7097", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 995968 for CVE-2016-7097", url: "https://bugzilla.suse.com/995968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "low", }, ], title: "CVE-2016-7097", }, { cve: "CVE-2016-7425", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7425", }, ], notes: [ { category: "general", text: "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7425", url: "https://www.suse.com/security/cve/CVE-2016-7425", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7425", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 999932 for CVE-2016-7425", url: "https://bugzilla.suse.com/999932", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-7425", }, { cve: "CVE-2016-7910", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7910", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7910", url: "https://www.suse.com/security/cve/CVE-2016-7910", }, { category: "external", summary: "SUSE Bug 1010716 for CVE-2016-7910", url: "https://bugzilla.suse.com/1010716", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7910", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 1196722 for CVE-2016-7910", url: "https://bugzilla.suse.com/1196722", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-7910", }, { cve: "CVE-2016-7911", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7911", }, ], notes: [ { category: "general", text: "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7911", url: "https://www.suse.com/security/cve/CVE-2016-7911", }, { category: "external", summary: "SUSE Bug 1010711 for CVE-2016-7911", url: "https://bugzilla.suse.com/1010711", }, { category: "external", summary: "SUSE Bug 1010713 for CVE-2016-7911", url: "https://bugzilla.suse.com/1010713", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7911", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-7911", }, { cve: "CVE-2016-7913", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7913", }, ], notes: [ { category: "general", text: "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7913", url: "https://www.suse.com/security/cve/CVE-2016-7913", }, { category: "external", summary: "SUSE Bug 1010478 for CVE-2016-7913", url: "https://bugzilla.suse.com/1010478", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "important", }, ], title: "CVE-2016-7913", }, { cve: "CVE-2016-7914", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7914", }, ], notes: [ { category: "general", text: "The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7914", url: "https://www.suse.com/security/cve/CVE-2016-7914", }, { category: "external", summary: "SUSE Bug 1010475 for CVE-2016-7914", url: "https://bugzilla.suse.com/1010475", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-7914", }, { cve: "CVE-2016-8399", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8399", }, ], notes: [ { category: "general", text: "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8399", url: "https://www.suse.com/security/cve/CVE-2016-8399", }, { category: "external", summary: "SUSE Bug 1014746 for CVE-2016-8399", url: "https://bugzilla.suse.com/1014746", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-8399", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-8399", }, { cve: "CVE-2016-8633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8633", }, ], notes: [ { category: "general", text: "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8633", url: "https://www.suse.com/security/cve/CVE-2016-8633", }, { category: "external", summary: "SUSE Bug 1008833 for CVE-2016-8633", url: "https://bugzilla.suse.com/1008833", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-8633", }, { cve: "CVE-2016-8645", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8645", }, ], notes: [ { category: "general", text: "The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8645", url: "https://www.suse.com/security/cve/CVE-2016-8645", }, { category: "external", summary: "SUSE Bug 1009969 for CVE-2016-8645", url: "https://bugzilla.suse.com/1009969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-8645", }, { cve: "CVE-2016-8658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8658", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8658", url: "https://www.suse.com/security/cve/CVE-2016-8658", }, { category: "external", summary: "SUSE Bug 1004462 for CVE-2016-8658", url: "https://bugzilla.suse.com/1004462", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-8658", }, { cve: "CVE-2016-9083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9083", }, ], notes: [ { category: "general", text: "drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \"state machine confusion bug.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9083", url: "https://www.suse.com/security/cve/CVE-2016-9083", }, { category: "external", summary: "SUSE Bug 1007197 for CVE-2016-9083", url: "https://bugzilla.suse.com/1007197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "low", }, ], title: "CVE-2016-9083", }, { cve: "CVE-2016-9084", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9084", }, ], notes: [ { category: "general", text: "drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9084", url: "https://www.suse.com/security/cve/CVE-2016-9084", }, { category: "external", summary: "SUSE Bug 1007197 for CVE-2016-9084", url: "https://bugzilla.suse.com/1007197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "low", }, ], title: "CVE-2016-9084", }, { cve: "CVE-2016-9756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9756", }, ], notes: [ { category: "general", text: "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9756", url: "https://www.suse.com/security/cve/CVE-2016-9756", }, { category: "external", summary: "SUSE Bug 1013038 for CVE-2016-9756", url: "https://bugzilla.suse.com/1013038", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-9756", }, { cve: "CVE-2016-9793", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9793", }, ], notes: [ { category: "general", text: "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9793", url: "https://www.suse.com/security/cve/CVE-2016-9793", }, { category: "external", summary: "SUSE Bug 1013531 for CVE-2016-9793", url: "https://bugzilla.suse.com/1013531", }, { category: "external", summary: "SUSE Bug 1013542 for CVE-2016-9793", url: "https://bugzilla.suse.com/1013542", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-9793", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2016-9793", }, { cve: "CVE-2016-9806", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9806", }, ], notes: [ { category: "general", text: "Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9806", url: "https://www.suse.com/security/cve/CVE-2016-9806", }, { category: "external", summary: "SUSE Bug 1013540 for CVE-2016-9806", url: "https://bugzilla.suse.com/1013540", }, { category: "external", summary: "SUSE Bug 1017589 for CVE-2016-9806", url: "https://bugzilla.suse.com/1017589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "important", }, ], title: "CVE-2016-9806", }, { cve: "CVE-2017-2583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2583", }, ], notes: [ { category: "general", text: "The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a \"MOV SS, NULL selector\" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2583", url: "https://www.suse.com/security/cve/CVE-2017-2583", }, { category: "external", summary: "SUSE Bug 1020602 for CVE-2017-2583", url: "https://bugzilla.suse.com/1020602", }, { category: "external", summary: "SUSE Bug 1030573 for CVE-2017-2583", url: "https://bugzilla.suse.com/1030573", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-2583", url: "https://bugzilla.suse.com/1087082", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2017-2583", }, { cve: "CVE-2017-2584", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2584", }, ], notes: [ { category: "general", text: "arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2584", url: "https://www.suse.com/security/cve/CVE-2017-2584", }, { category: "external", summary: "SUSE Bug 1019851 for CVE-2017-2584", url: "https://bugzilla.suse.com/1019851", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-2584", url: "https://bugzilla.suse.com/1087082", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "moderate", }, ], title: "CVE-2017-2584", }, { cve: "CVE-2017-5551", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5551", }, ], notes: [ { category: "general", text: "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5551", url: "https://www.suse.com/security/cve/CVE-2017-5551", }, { category: "external", summary: "SUSE Bug 1021258 for CVE-2017-5551", url: "https://bugzilla.suse.com/1021258", }, { category: "external", summary: "SUSE Bug 995968 for CVE-2017-5551", url: "https://bugzilla.suse.com/995968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-02-15T16:20:32Z", details: "low", }, ], title: "CVE-2017-5551", }, ], }
suse-su-2016:3304-1
Vulnerability from csaf_suse
Published
2016-12-30 13:09
Modified
2016-12-30 13:09
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.67 to receive various security and bugfixes.
This feature was added:
- fate#320805: Execute in place (XIP) support for the ext2 filesystem.
The following security bugs were fixed:
- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362).
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542)
- CVE-2016-6327: System using the infiniband support module ib_srpt were vulnerable to a denial of service by system crash by a local attacker who is able to abort writes by sending the ABORT_TASK command (bsc#994758)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608)
- CVE-2016-6828: Use after free 4 in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bsc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#995968).
- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)
- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bsc#1004462).
The following non-security bugs were fixed:
- aacraid: Fix RRQ overload (bsc#1003079).
- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up.
- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).
- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).
- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing).
- avoid dentry crash triggered by NFS (bsc#984194).
- be2net: Don't leak iomapped memory on removal (bsc#921784 FATE#318561).
- be2net: fix BE3-R FW download compatibility check (bsc#921784 FATE#318561).
- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784 FATE#318561).
- be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784 FATE#318561).
- blkfront: fix an error path memory leak (luckily none so far).
- blk-mq: fix undefined behaviour in order_to_size().
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925, CVE-2015-8956).
- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes.
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring.
- bonding: Prevent IPv6 link local address on enslaved devices.
- bonding: prevent out of bound accesses.
- bonding: set carrier off for devices created through netlink (bsc#999577).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).
- btrfs: Disable btrfs-8448-improve-performance-on-fsync-against-new-inode.patch (bsc#981597).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)
- btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).
- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).
- ceph: Refresh patches.suse/CFS-0259-ceph-Asynchronous-IO-support.patch. After a write, we must free the 'request', not the 'response' (bsc#995153).
- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).
- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).
- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).
- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)
- efi: Small leak on error in runtime map code (fate#315019).
- ext2: Enable ext2 driver in config files (bsc#976195).
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- hyperv: enable call to clockevents_unbind_device in kexec/kdump path
- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel
- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).
- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).
- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257).
- ipv6: fix multipath route replace error recovery (bsc#930399).
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).
- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).
- kernel/printk: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).
- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).
- kvm: vmx: defer load of APIC access page address during reset (bsc#959463).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).
- libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).
- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- module: Issue warnings when tainting kernel (bsc#974406).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- mpt3sas: Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).
- msi-x: fix an error path (luckily none so far).
- netback: fix flipping mode (bsc#996664).
- netback: fix refounting (bsc#978094).
- netfront: don't truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).
- nfs: Add a stub for GETDEVICELIST (bnc#898675).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfsd: Use free_conn to free connection (bsc#979451).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).
- nfs: fix pg_test page count calculation (bnc#898675).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).
- oops on restarting network with bonding mode4 (lacp) (bsc#876145).
- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).
- perf/x86/intel: Fix bug for 'cycles:p' and 'cycles:pp' on SLM (bsc#997896).
- PM / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).
- PM / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).
- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).
- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)
- radeon: avoid boot hang in Xen Dom0 (luckily none so far).
- ratelimit: extend to print suppressed messages on release (bsc#979928).
- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- Revert 'Input: i8042 - break load dependency between atkbd/psmouse and i8042'.
- Revert 'Input: i8042 - set up shared ps2_cmd_mutex for AUX ports'.
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rtnetlink: avoid 0 sized arrays.
- RTNL: assertion failed at dev.c (bsc#875631).
- s390: add SMT support (bnc#994438).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- SUNRPC: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).
- SUNRPC: Fix a regression when reconnecting (bsc#946309).
- supported.conf: Add ext2
- supported.conf: Add iscsi modules to -base (bsc#997299)
- supported.conf: Add tun to -base (bsc#992593)
- supported.conf: Add veth to -base (bsc#992591)
- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).
- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).
- tcp: add proper TS val into RST packets (bsc#937086).
- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).
- tcp: fix child sockets to use system default congestion control if not set.
- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).
- tcp: refresh skb timestamp at retransmit time (bsc#937086).
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).
- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).
- xenbus: don't invoke ->is_ready() for most device states (bsc#987333).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen/pciback: Fix conf_space read/write overlap check.
- xen-pciback: return proper values during BAR sizing.
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: Check if slot is already in default state before moving it there (FATE#315518).
- xhci: silence warnings in switch (bnc#991665).
Patchnames
SUSE-SLE-RT-12-SP1-2016-1938
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.67 to receive various security and bugfixes.\n\nThis feature was added:\n\n- fate#320805: Execute in place (XIP) support for the ext2 filesystem.\n\nThe following security bugs were fixed:\n\n- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362).\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)\n- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542)\n- CVE-2016-6327: System using the infiniband support module ib_srpt were vulnerable to a denial of service by system crash by a local attacker who is able to abort writes by sending the ABORT_TASK command (bsc#994758)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608)\n- CVE-2016-6828: Use after free 4 in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bsc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#995968).\n- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)\n- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bsc#1004462).\n\nThe following non-security bugs were fixed:\n\n- aacraid: Fix RRQ overload (bsc#1003079).\n- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up.\n- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).\n- apparmor: add missing id bounds check on dfa verification (bsc#1000304).\n- apparmor: check that xindex is in trans_table bounds (bsc#1000304).\n- apparmor: do not expose kernel stack (bsc#1000304).\n- apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304).\n- apparmor: ensure the target profile name is always audited (bsc#1000304).\n- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).\n- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).\n- apparmor: fix audit full profile hname on successful load (bsc#1000304).\n- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).\n- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).\n- apparmor: fix log failures for all profiles in a set (bsc#1000304).\n- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).\n- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).\n- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).\n- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).\n- apparmor: fix refcount bug in profile replacement (bsc#1000304).\n- apparmor: fix refcount race when finding a child profile (bsc#1000304).\n- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).\n- apparmor: fix uninitialized lsm_audit member (bsc#1000304).\n- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).\n- apparmor: internal paths should be treated as disconnected (bsc#1000304).\n- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).\n- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing).\n- avoid dentry crash triggered by NFS (bsc#984194).\n- be2net: Don't leak iomapped memory on removal (bsc#921784 FATE#318561).\n- be2net: fix BE3-R FW download compatibility check (bsc#921784 FATE#318561).\n- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784 FATE#318561).\n- be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784 FATE#318561).\n- blkfront: fix an error path memory leak (luckily none so far).\n- blk-mq: fix undefined behaviour in order_to_size().\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925, CVE-2015-8956).\n- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes.\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring.\n- bonding: Prevent IPv6 link local address on enslaved devices.\n- bonding: prevent out of bound accesses.\n- bonding: set carrier off for devices created through netlink (bsc#999577).\n- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).\n- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).\n- btrfs: Disable btrfs-8448-improve-performance-on-fsync-against-new-inode.patch (bsc#981597).\n- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).\n- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)\n- btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489).\n- btrfs: handle quota reserve failure properly (bsc#1005666).\n- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).\n- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).\n- btrfs: properly track when rescan worker is running (bsc#989953).\n- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).\n- btrfs: skip superblocks during discard (bsc#904489).\n- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).\n- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).\n- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).\n- ceph: Refresh patches.suse/CFS-0259-ceph-Asynchronous-IO-support.patch. After a write, we must free the 'request', not the 'response' (bsc#995153).\n- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).\n- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).\n- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).\n- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)\n- efi: Small leak on error in runtime map code (fate#315019).\n- ext2: Enable ext2 driver in config files (bsc#976195).\n- ext4: Add parameter for tuning handling of ext2 (bsc#976195).\n- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).\n- fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- hyperv: enable call to clockevents_unbind_device in kexec/kdump path\n- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel\n- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).\n- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).\n- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).\n- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).\n- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).\n- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257).\n- ipv6: fix multipath route replace error recovery (bsc#930399).\n- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).\n- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).\n- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).\n- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).\n- kernel/printk: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).\n- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).\n- kvm: vmx: defer load of APIC access page address during reset (bsc#959463).\n- libceph: enable large, variable-sized OSD requests (bsc#988715).\n- libceph: make r_request msg_size calculation clearer (bsc#988715).\n- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).\n- libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715).\n- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).\n- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- module: Issue warnings when tainting kernel (bsc#974406).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- mpt3sas: Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).\n- msi-x: fix an error path (luckily none so far).\n- netback: fix flipping mode (bsc#996664).\n- netback: fix refounting (bsc#978094).\n- netfront: don't truncate grant references.\n- netfront: use correct linear area after linearizing an skb (bsc#1007886).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).\n- nfs: Add a stub for GETDEVICELIST (bnc#898675).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfsd: Use free_conn to free connection (bsc#979451).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).\n- nfs: fix pg_test page count calculation (bnc#898675).\n- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).\n- oops on restarting network with bonding mode4 (lacp) (bsc#876145).\n- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).\n- perf/x86/intel: Fix bug for 'cycles:p' and 'cycles:pp' on SLM (bsc#997896).\n- PM / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).\n- PM / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).\n- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).\n- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)\n- radeon: avoid boot hang in Xen Dom0 (luckily none so far).\n- ratelimit: extend to print suppressed messages on release (bsc#979928).\n- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).\n- rbd: truncate objects on cmpext short reads (bsc#988715).\n- Revert 'Input: i8042 - break load dependency between atkbd/psmouse and i8042'.\n- Revert 'Input: i8042 - set up shared ps2_cmd_mutex for AUX ports'.\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- rtnetlink: avoid 0 sized arrays.\n- RTNL: assertion failed at dev.c (bsc#875631).\n- s390: add SMT support (bnc#994438).\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).\n- squashfs3: properly handle dir_emit() failures (bsc#998795).\n- SUNRPC: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).\n- SUNRPC: Fix a regression when reconnecting (bsc#946309).\n- supported.conf: Add ext2\n- supported.conf: Add iscsi modules to -base (bsc#997299)\n- supported.conf: Add tun to -base (bsc#992593)\n- supported.conf: Add veth to -base (bsc#992591)\n- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).\n- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).\n- tcp: add proper TS val into RST packets (bsc#937086).\n- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).\n- tcp: fix child sockets to use system default congestion control if not set.\n- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).\n- tcp: refresh skb timestamp at retransmit time (bsc#937086).\n- timers: Use proper base migration in add_timer_on() (bnc#993392).\n- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).\n- tunnels: Remove encapsulation offloads on decap (bsc#1001486).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).\n- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).\n- xenbus: don't invoke ->is_ready() for most device states (bsc#987333).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen/pciback: Fix conf_space read/write overlap check.\n- xen-pciback: return proper values during BAR sizing.\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).\n- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- xhci: Check if slot is already in default state before moving it there (FATE#315518).\n- xhci: silence warnings in switch (bnc#991665).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-RT-12-SP1-2016-1938", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3304-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:3304-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20163304-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:3304-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html", }, { category: "self", summary: "SUSE Bug 1000189", url: "https://bugzilla.suse.com/1000189", }, { category: "self", summary: "SUSE Bug 1000287", url: "https://bugzilla.suse.com/1000287", }, { category: "self", summary: "SUSE Bug 1000304", url: "https://bugzilla.suse.com/1000304", }, { category: "self", summary: "SUSE Bug 1000776", url: "https://bugzilla.suse.com/1000776", }, { category: "self", summary: "SUSE Bug 1001419", url: "https://bugzilla.suse.com/1001419", }, { category: "self", summary: "SUSE Bug 1001486", url: "https://bugzilla.suse.com/1001486", }, { category: "self", summary: "SUSE Bug 1002165", url: "https://bugzilla.suse.com/1002165", }, { category: "self", summary: "SUSE Bug 1003079", url: "https://bugzilla.suse.com/1003079", }, { category: "self", summary: "SUSE Bug 1003153", url: "https://bugzilla.suse.com/1003153", }, { category: "self", summary: "SUSE Bug 1003400", url: "https://bugzilla.suse.com/1003400", }, { category: "self", summary: "SUSE Bug 1003568", url: "https://bugzilla.suse.com/1003568", }, { category: "self", summary: "SUSE Bug 1003925", url: "https://bugzilla.suse.com/1003925", }, { category: "self", summary: "SUSE Bug 1004252", url: "https://bugzilla.suse.com/1004252", }, { category: "self", summary: "SUSE Bug 1004418", url: "https://bugzilla.suse.com/1004418", }, { category: "self", summary: "SUSE Bug 1004462", url: "https://bugzilla.suse.com/1004462", }, { category: "self", summary: "SUSE Bug 1004517", url: "https://bugzilla.suse.com/1004517", }, { category: "self", summary: "SUSE Bug 1004520", url: "https://bugzilla.suse.com/1004520", }, { category: "self", summary: "SUSE Bug 1005666", url: "https://bugzilla.suse.com/1005666", }, { category: "self", summary: "SUSE Bug 1006691", url: "https://bugzilla.suse.com/1006691", }, { category: "self", summary: "SUSE Bug 1007615", url: "https://bugzilla.suse.com/1007615", }, { category: "self", summary: "SUSE Bug 1007886", url: "https://bugzilla.suse.com/1007886", }, { category: "self", summary: "SUSE Bug 744692", url: "https://bugzilla.suse.com/744692", }, { category: "self", summary: "SUSE Bug 789311", url: "https://bugzilla.suse.com/789311", }, { category: "self", summary: "SUSE Bug 857397", url: "https://bugzilla.suse.com/857397", }, { category: "self", summary: "SUSE Bug 860441", url: "https://bugzilla.suse.com/860441", }, { category: "self", summary: "SUSE Bug 865545", url: "https://bugzilla.suse.com/865545", }, { category: "self", summary: "SUSE Bug 866130", url: "https://bugzilla.suse.com/866130", }, { category: "self", summary: "SUSE Bug 868923", url: "https://bugzilla.suse.com/868923", }, { category: "self", summary: "SUSE Bug 874131", url: "https://bugzilla.suse.com/874131", }, { category: "self", summary: "SUSE Bug 875631", url: "https://bugzilla.suse.com/875631", }, { category: "self", summary: "SUSE Bug 876145", url: "https://bugzilla.suse.com/876145", }, { category: "self", summary: "SUSE Bug 876463", url: "https://bugzilla.suse.com/876463", }, { category: "self", summary: "SUSE Bug 898675", url: "https://bugzilla.suse.com/898675", }, { category: "self", summary: "SUSE Bug 904489", url: "https://bugzilla.suse.com/904489", }, { category: "self", summary: "SUSE Bug 909994", url: "https://bugzilla.suse.com/909994", }, { category: "self", summary: "SUSE Bug 911687", url: "https://bugzilla.suse.com/911687", }, { category: "self", summary: "SUSE Bug 915183", url: "https://bugzilla.suse.com/915183", }, { category: "self", summary: "SUSE Bug 921338", url: "https://bugzilla.suse.com/921338", }, { category: "self", summary: "SUSE Bug 921784", url: "https://bugzilla.suse.com/921784", }, { category: "self", summary: "SUSE Bug 922064", url: "https://bugzilla.suse.com/922064", }, { category: "self", summary: "SUSE Bug 922634", url: "https://bugzilla.suse.com/922634", }, { category: "self", summary: "SUSE Bug 924381", url: "https://bugzilla.suse.com/924381", }, { category: "self", summary: "SUSE Bug 924384", url: "https://bugzilla.suse.com/924384", }, { category: "self", summary: "SUSE Bug 930399", url: "https://bugzilla.suse.com/930399", }, { category: "self", summary: "SUSE Bug 934067", url: "https://bugzilla.suse.com/934067", }, { category: "self", summary: "SUSE Bug 937086", url: "https://bugzilla.suse.com/937086", }, { category: "self", summary: "SUSE Bug 937888", url: "https://bugzilla.suse.com/937888", }, { category: "self", summary: "SUSE Bug 941420", url: "https://bugzilla.suse.com/941420", }, { category: "self", summary: "SUSE Bug 946309", url: "https://bugzilla.suse.com/946309", }, { category: "self", summary: "SUSE Bug 955446", url: "https://bugzilla.suse.com/955446", }, { category: "self", summary: "SUSE Bug 956514", url: "https://bugzilla.suse.com/956514", }, { category: "self", summary: "SUSE Bug 959463", url: "https://bugzilla.suse.com/959463", }, { category: "self", summary: "SUSE Bug 961257", url: "https://bugzilla.suse.com/961257", }, { category: "self", summary: "SUSE Bug 962846", url: "https://bugzilla.suse.com/962846", }, { category: "self", summary: "SUSE Bug 963655", url: "https://bugzilla.suse.com/963655", }, { category: "self", summary: "SUSE Bug 963767", url: "https://bugzilla.suse.com/963767", }, { category: "self", summary: "SUSE Bug 966864", url: "https://bugzilla.suse.com/966864", }, { category: "self", summary: "SUSE Bug 967640", url: "https://bugzilla.suse.com/967640", }, { category: "self", summary: "SUSE Bug 970943", url: "https://bugzilla.suse.com/970943", }, { category: "self", summary: "SUSE Bug 971975", url: "https://bugzilla.suse.com/971975", }, { category: "self", summary: "SUSE Bug 971989", url: "https://bugzilla.suse.com/971989", }, { category: "self", summary: "SUSE Bug 974406", url: "https://bugzilla.suse.com/974406", }, { category: "self", summary: "SUSE Bug 974620", url: "https://bugzilla.suse.com/974620", }, { category: "self", summary: "SUSE Bug 975596", url: "https://bugzilla.suse.com/975596", }, { category: "self", summary: "SUSE Bug 975772", url: "https://bugzilla.suse.com/975772", }, { category: "self", summary: "SUSE Bug 976195", url: "https://bugzilla.suse.com/976195", }, { category: "self", summary: "SUSE Bug 977687", url: "https://bugzilla.suse.com/977687", }, { category: "self", summary: "SUSE Bug 978094", url: "https://bugzilla.suse.com/978094", }, { category: "self", summary: "SUSE Bug 979451", url: "https://bugzilla.suse.com/979451", }, { category: "self", summary: "SUSE Bug 979681", url: "https://bugzilla.suse.com/979681", }, { category: "self", summary: "SUSE Bug 979928", url: "https://bugzilla.suse.com/979928", }, { category: "self", summary: "SUSE Bug 980371", url: "https://bugzilla.suse.com/980371", }, { category: "self", summary: "SUSE Bug 981597", url: "https://bugzilla.suse.com/981597", }, { category: "self", summary: "SUSE Bug 982783", url: "https://bugzilla.suse.com/982783", }, { category: "self", summary: "SUSE Bug 983619", url: "https://bugzilla.suse.com/983619", }, { category: "self", summary: "SUSE Bug 984194", url: "https://bugzilla.suse.com/984194", }, { category: "self", summary: "SUSE Bug 984419", url: "https://bugzilla.suse.com/984419", }, { category: "self", summary: "SUSE Bug 984779", url: "https://bugzilla.suse.com/984779", }, { category: "self", summary: "SUSE Bug 984992", url: "https://bugzilla.suse.com/984992", }, { category: "self", summary: "SUSE Bug 985562", url: "https://bugzilla.suse.com/985562", }, { category: "self", summary: "SUSE Bug 986362", url: "https://bugzilla.suse.com/986362", }, { category: "self", summary: "SUSE Bug 986365", url: "https://bugzilla.suse.com/986365", }, { category: "self", summary: "SUSE Bug 986445", url: "https://bugzilla.suse.com/986445", }, { category: "self", summary: "SUSE Bug 987192", url: "https://bugzilla.suse.com/987192", }, { category: "self", summary: "SUSE Bug 987333", url: "https://bugzilla.suse.com/987333", }, { category: "self", summary: "SUSE Bug 987542", url: "https://bugzilla.suse.com/987542", }, { category: "self", summary: "SUSE Bug 987565", url: "https://bugzilla.suse.com/987565", }, { category: "self", summary: "SUSE Bug 987621", url: "https://bugzilla.suse.com/987621", }, { category: "self", summary: "SUSE Bug 987805", url: "https://bugzilla.suse.com/987805", }, { category: "self", summary: "SUSE Bug 988440", url: "https://bugzilla.suse.com/988440", }, { category: "self", summary: "SUSE Bug 988617", url: "https://bugzilla.suse.com/988617", }, { category: "self", summary: "SUSE Bug 988715", url: "https://bugzilla.suse.com/988715", }, { category: "self", summary: "SUSE Bug 989152", url: "https://bugzilla.suse.com/989152", }, { category: "self", summary: "SUSE Bug 989953", url: "https://bugzilla.suse.com/989953", }, { category: "self", summary: "SUSE Bug 990058", url: "https://bugzilla.suse.com/990058", }, { category: "self", summary: "SUSE Bug 990245", url: "https://bugzilla.suse.com/990245", }, { category: "self", summary: "SUSE Bug 991247", url: "https://bugzilla.suse.com/991247", }, { category: "self", summary: "SUSE Bug 991608", url: "https://bugzilla.suse.com/991608", }, { category: "self", summary: "SUSE Bug 991665", url: "https://bugzilla.suse.com/991665", }, { category: "self", summary: "SUSE Bug 991667", url: "https://bugzilla.suse.com/991667", }, { category: "self", summary: "SUSE Bug 992244", url: "https://bugzilla.suse.com/992244", }, { category: "self", summary: "SUSE Bug 992555", url: "https://bugzilla.suse.com/992555", }, { category: "self", summary: "SUSE Bug 992568", url: "https://bugzilla.suse.com/992568", }, { category: "self", summary: "SUSE Bug 992591", url: "https://bugzilla.suse.com/992591", }, { category: "self", summary: "SUSE Bug 992593", url: "https://bugzilla.suse.com/992593", }, { category: "self", summary: "SUSE Bug 992712", url: "https://bugzilla.suse.com/992712", }, { category: "self", summary: "SUSE Bug 993392", url: "https://bugzilla.suse.com/993392", }, { category: "self", summary: "SUSE Bug 993841", url: "https://bugzilla.suse.com/993841", }, { category: "self", summary: "SUSE Bug 993890", url: "https://bugzilla.suse.com/993890", }, { category: "self", summary: "SUSE Bug 993891", url: "https://bugzilla.suse.com/993891", }, { category: "self", summary: "SUSE Bug 994167", url: "https://bugzilla.suse.com/994167", }, { category: "self", summary: "SUSE Bug 994296", url: "https://bugzilla.suse.com/994296", }, { category: "self", summary: "SUSE Bug 994438", url: "https://bugzilla.suse.com/994438", }, { category: "self", summary: "SUSE Bug 994520", url: "https://bugzilla.suse.com/994520", }, { category: "self", summary: "SUSE Bug 994758", url: "https://bugzilla.suse.com/994758", }, { category: "self", summary: "SUSE Bug 995153", url: "https://bugzilla.suse.com/995153", }, { category: "self", summary: "SUSE Bug 995968", url: "https://bugzilla.suse.com/995968", }, { category: "self", summary: "SUSE Bug 996664", url: "https://bugzilla.suse.com/996664", }, { category: "self", summary: "SUSE Bug 997059", url: "https://bugzilla.suse.com/997059", }, { category: "self", summary: "SUSE Bug 997299", url: "https://bugzilla.suse.com/997299", }, { category: "self", summary: "SUSE Bug 997708", url: "https://bugzilla.suse.com/997708", }, { category: "self", summary: "SUSE Bug 997896", url: "https://bugzilla.suse.com/997896", }, { category: "self", summary: "SUSE Bug 998689", url: "https://bugzilla.suse.com/998689", }, { category: "self", summary: "SUSE Bug 998795", url: "https://bugzilla.suse.com/998795", }, { category: "self", summary: "SUSE Bug 998825", url: "https://bugzilla.suse.com/998825", }, { category: "self", summary: "SUSE Bug 999577", url: "https://bugzilla.suse.com/999577", }, { category: "self", summary: "SUSE Bug 999584", url: "https://bugzilla.suse.com/999584", }, { category: "self", summary: "SUSE Bug 999600", url: "https://bugzilla.suse.com/999600", }, { category: "self", summary: "SUSE Bug 999779", url: "https://bugzilla.suse.com/999779", }, { category: "self", summary: "SUSE Bug 999907", url: "https://bugzilla.suse.com/999907", }, { category: "self", summary: "SUSE Bug 999932", url: "https://bugzilla.suse.com/999932", }, { category: "self", summary: "SUSE CVE CVE-2015-8956 page", url: "https://www.suse.com/security/cve/CVE-2015-8956/", }, { category: "self", summary: "SUSE CVE CVE-2016-2069 page", url: "https://www.suse.com/security/cve/CVE-2016-2069/", }, { category: "self", summary: "SUSE CVE CVE-2016-4997 page", url: "https://www.suse.com/security/cve/CVE-2016-4997/", }, { category: "self", summary: "SUSE CVE CVE-2016-5195 page", url: "https://www.suse.com/security/cve/CVE-2016-5195/", }, { category: "self", summary: "SUSE CVE CVE-2016-5696 page", url: "https://www.suse.com/security/cve/CVE-2016-5696/", }, { category: "self", summary: "SUSE CVE CVE-2016-6130 page", url: "https://www.suse.com/security/cve/CVE-2016-6130/", }, { category: "self", summary: "SUSE CVE CVE-2016-6327 page", url: "https://www.suse.com/security/cve/CVE-2016-6327/", }, { category: "self", summary: "SUSE CVE CVE-2016-6480 page", url: "https://www.suse.com/security/cve/CVE-2016-6480/", }, { category: "self", summary: "SUSE CVE CVE-2016-6828 page", url: "https://www.suse.com/security/cve/CVE-2016-6828/", }, { category: "self", summary: "SUSE CVE CVE-2016-7042 page", url: "https://www.suse.com/security/cve/CVE-2016-7042/", }, { category: "self", summary: "SUSE CVE CVE-2016-7097 page", url: "https://www.suse.com/security/cve/CVE-2016-7097/", }, { category: "self", summary: "SUSE CVE CVE-2016-7425 page", url: "https://www.suse.com/security/cve/CVE-2016-7425/", }, { category: "self", summary: "SUSE CVE CVE-2016-8658 page", url: "https://www.suse.com/security/cve/CVE-2016-8658/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2016-12-30T13:09:04Z", generator: { date: "2016-12-30T13:09:04Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:3304-1", initial_release_date: "2016-12-30T13:09:04Z", revision_history: [ { date: "2016-12-30T13:09:04Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-3.12.67-60.27.1.noarch", product: { name: "kernel-devel-rt-3.12.67-60.27.1.noarch", product_id: "kernel-devel-rt-3.12.67-60.27.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-3.12.67-60.27.1.noarch", product: { name: "kernel-source-rt-3.12.67-60.27.1.noarch", product_id: "kernel-source-rt-3.12.67-60.27.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-compute-3.12.67-60.27.1.x86_64", product: { name: "kernel-compute-3.12.67-60.27.1.x86_64", product_id: "kernel-compute-3.12.67-60.27.1.x86_64", }, }, { category: "product_version", name: "kernel-compute-base-3.12.67-60.27.1.x86_64", product: { name: "kernel-compute-base-3.12.67-60.27.1.x86_64", product_id: "kernel-compute-base-3.12.67-60.27.1.x86_64", }, }, { category: "product_version", name: "kernel-compute-devel-3.12.67-60.27.1.x86_64", product: { name: "kernel-compute-devel-3.12.67-60.27.1.x86_64", product_id: "kernel-compute-devel-3.12.67-60.27.1.x86_64", }, }, { category: "product_version", name: "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", product: { name: "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", product_id: "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-3.12.67-60.27.1.x86_64", product: { name: "kernel-rt-3.12.67-60.27.1.x86_64", product_id: "kernel-rt-3.12.67-60.27.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-3.12.67-60.27.1.x86_64", product: { name: "kernel-rt-base-3.12.67-60.27.1.x86_64", product_id: "kernel-rt-base-3.12.67-60.27.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-3.12.67-60.27.1.x86_64", product: { name: "kernel-rt-devel-3.12.67-60.27.1.x86_64", product_id: "kernel-rt-devel-3.12.67-60.27.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", product: { name: "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", product_id: "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-3.12.67-60.27.1.x86_64", product: { name: "kernel-syms-rt-3.12.67-60.27.1.x86_64", product_id: "kernel-syms-rt-3.12.67-60.27.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 12 SP1", product: { name: "SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1", }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-compute-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", }, product_reference: "kernel-compute-3.12.67-60.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-compute-base-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", }, product_reference: "kernel-compute-base-3.12.67-60.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-compute-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", }, product_reference: "kernel-compute-devel-3.12.67-60.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", }, product_reference: "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-3.12.67-60.27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", }, product_reference: "kernel-devel-rt-3.12.67-60.27.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", }, product_reference: "kernel-rt-3.12.67-60.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", }, product_reference: "kernel-rt-base-3.12.67-60.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", }, product_reference: "kernel-rt-devel-3.12.67-60.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", }, product_reference: "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-3.12.67-60.27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", }, product_reference: "kernel-source-rt-3.12.67-60.27.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", product_id: "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", }, product_reference: "kernel-syms-rt-3.12.67-60.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2015-8956", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8956", }, ], notes: [ { category: "general", text: "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8956", url: "https://www.suse.com/security/cve/CVE-2015-8956", }, { category: "external", summary: "SUSE Bug 1003925 for CVE-2015-8956", url: "https://bugzilla.suse.com/1003925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "moderate", }, ], title: "CVE-2015-8956", }, { cve: "CVE-2016-2069", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2069", }, ], notes: [ { category: "general", text: "Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2069", url: "https://www.suse.com/security/cve/CVE-2016-2069", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-2069", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-2069", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-2069", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 963767 for CVE-2016-2069", url: "https://bugzilla.suse.com/963767", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "low", }, ], title: "CVE-2016-2069", }, { cve: "CVE-2016-4997", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4997", }, ], notes: [ { category: "general", text: "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4997", url: "https://www.suse.com/security/cve/CVE-2016-4997", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-4997", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 986362 for CVE-2016-4997", url: "https://bugzilla.suse.com/986362", }, { category: "external", summary: "SUSE Bug 986365 for CVE-2016-4997", url: "https://bugzilla.suse.com/986365", }, { category: "external", summary: "SUSE Bug 986377 for CVE-2016-4997", url: "https://bugzilla.suse.com/986377", }, { category: "external", summary: "SUSE Bug 991651 for CVE-2016-4997", url: "https://bugzilla.suse.com/991651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "important", }, ], title: "CVE-2016-4997", }, { cve: "CVE-2016-5195", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5195", }, ], notes: [ { category: "general", text: "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5195", url: "https://www.suse.com/security/cve/CVE-2016-5195", }, { category: "external", summary: "SUSE Bug 1004418 for CVE-2016-5195", url: "https://bugzilla.suse.com/1004418", }, { category: "external", summary: "SUSE Bug 1004419 for CVE-2016-5195", url: "https://bugzilla.suse.com/1004419", }, { category: "external", summary: "SUSE Bug 1004436 for CVE-2016-5195", url: "https://bugzilla.suse.com/1004436", }, { category: "external", summary: "SUSE Bug 1006323 for CVE-2016-5195", url: "https://bugzilla.suse.com/1006323", }, { category: "external", summary: "SUSE Bug 1006695 for CVE-2016-5195", url: "https://bugzilla.suse.com/1006695", }, { category: "external", summary: "SUSE Bug 1007291 for CVE-2016-5195", url: "https://bugzilla.suse.com/1007291", }, { category: "external", summary: "SUSE Bug 1008110 for CVE-2016-5195", url: "https://bugzilla.suse.com/1008110", }, { category: "external", summary: "SUSE Bug 1030118 for CVE-2016-5195", url: "https://bugzilla.suse.com/1030118", }, { category: "external", summary: "SUSE Bug 1046453 for CVE-2016-5195", url: "https://bugzilla.suse.com/1046453", }, { category: "external", summary: "SUSE Bug 1069496 for CVE-2016-5195", url: "https://bugzilla.suse.com/1069496", }, { category: "external", summary: "SUSE Bug 1149725 for CVE-2016-5195", url: "https://bugzilla.suse.com/1149725", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-5195", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 986445 for CVE-2016-5195", url: "https://bugzilla.suse.com/986445", }, { category: "external", summary: "SUSE Bug 998689 for CVE-2016-5195", url: "https://bugzilla.suse.com/998689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "important", }, ], title: "CVE-2016-5195", }, { cve: "CVE-2016-5696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5696", }, ], notes: [ { category: "general", text: "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5696", url: "https://www.suse.com/security/cve/CVE-2016-5696", }, { category: "external", summary: "SUSE Bug 1020452 for CVE-2016-5696", url: "https://bugzilla.suse.com/1020452", }, { category: "external", summary: "SUSE Bug 1175721 for CVE-2016-5696", url: "https://bugzilla.suse.com/1175721", }, { category: "external", summary: "SUSE Bug 989152 for CVE-2016-5696", url: "https://bugzilla.suse.com/989152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "moderate", }, ], title: "CVE-2016-5696", }, { cve: "CVE-2016-6130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6130", }, ], notes: [ { category: "general", text: "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6130", url: "https://www.suse.com/security/cve/CVE-2016-6130", }, { category: "external", summary: "SUSE Bug 987542 for CVE-2016-6130", url: "https://bugzilla.suse.com/987542", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "moderate", }, ], title: "CVE-2016-6130", }, { cve: "CVE-2016-6327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6327", }, ], notes: [ { category: "general", text: "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6327", url: "https://www.suse.com/security/cve/CVE-2016-6327", }, { category: "external", summary: "SUSE Bug 994748 for CVE-2016-6327", url: "https://bugzilla.suse.com/994748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "moderate", }, ], title: "CVE-2016-6327", }, { cve: "CVE-2016-6480", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6480", }, ], notes: [ { category: "general", text: "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6480", url: "https://www.suse.com/security/cve/CVE-2016-6480", }, { category: "external", summary: "SUSE Bug 1004418 for CVE-2016-6480", url: "https://bugzilla.suse.com/1004418", }, { category: "external", summary: "SUSE Bug 991608 for CVE-2016-6480", url: "https://bugzilla.suse.com/991608", }, { category: "external", summary: "SUSE Bug 991667 for CVE-2016-6480", url: "https://bugzilla.suse.com/991667", }, { category: "external", summary: "SUSE Bug 992568 for CVE-2016-6480", url: "https://bugzilla.suse.com/992568", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "moderate", }, ], title: "CVE-2016-6480", }, { cve: "CVE-2016-6828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6828", }, ], notes: [ { category: "general", text: "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6828", url: "https://www.suse.com/security/cve/CVE-2016-6828", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-6828", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 994296 for CVE-2016-6828", url: "https://bugzilla.suse.com/994296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "moderate", }, ], title: "CVE-2016-6828", }, { cve: "CVE-2016-7042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7042", }, ], notes: [ { category: "general", text: "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7042", url: "https://www.suse.com/security/cve/CVE-2016-7042", }, { category: "external", summary: "SUSE Bug 1004517 for CVE-2016-7042", url: "https://bugzilla.suse.com/1004517", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "moderate", }, ], title: "CVE-2016-7042", }, { cve: "CVE-2016-7097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7097", }, ], notes: [ { category: "general", text: "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7097", url: "https://www.suse.com/security/cve/CVE-2016-7097", }, { category: "external", summary: "SUSE Bug 1021258 for CVE-2016-7097", url: "https://bugzilla.suse.com/1021258", }, { category: "external", summary: "SUSE Bug 1052256 for CVE-2016-7097", url: "https://bugzilla.suse.com/1052256", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2016-7097", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 995968 for CVE-2016-7097", url: "https://bugzilla.suse.com/995968", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "low", }, ], title: "CVE-2016-7097", }, { cve: "CVE-2016-7425", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7425", }, ], notes: [ { category: "general", text: "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7425", url: "https://www.suse.com/security/cve/CVE-2016-7425", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-7425", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 999932 for CVE-2016-7425", url: "https://bugzilla.suse.com/999932", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "moderate", }, ], title: "CVE-2016-7425", }, { cve: "CVE-2016-8658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8658", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8658", url: "https://www.suse.com/security/cve/CVE-2016-8658", }, { category: "external", summary: "SUSE Bug 1004462 for CVE-2016-8658", url: "https://bugzilla.suse.com/1004462", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-30T13:09:04Z", details: "moderate", }, ], title: "CVE-2016-8658", }, ], }
gsd-2016-6130
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.
Aliases
Aliases
{ GSD: { alias: "CVE-2016-6130", description: "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", id: "GSD-2016-6130", references: [ "https://www.suse.com/security/cve/CVE-2016-6130.html", "https://www.debian.org/security/2016/dsa-3616", "https://ubuntu.com/security/CVE-2016-6130", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2016-6130", ], details: "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", id: "GSD-2016-6130", modified: "2023-12-13T01:21:23.663250Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-6130", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", refsource: "CONFIRM", url: "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { name: "DSA-3616", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3616", }, { name: "91540", refsource: "BID", url: "http://www.securityfocus.com/bid/91540", }, { name: "20160630 [CVE-2016-6130] Double-Fetch Vulnerability in Linux-4.5/drivers/s390/char/sclp_ctl.c", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/538803/30/0/threaded", }, { name: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6", refsource: "CONFIRM", url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { name: "https://bugzilla.kernel.org/show_bug.cgi?id=116741", refsource: "CONFIRM", url: "https://bugzilla.kernel.org/show_bug.cgi?id=116741", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "4.5.5", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-6130", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-362", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", refsource: "CONFIRM", tags: [ "Patch", "Vendor Advisory", ], url: "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { name: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6", refsource: "CONFIRM", tags: [], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { name: "20160630 [CVE-2016-6130] Double-Fetch Vulnerability in Linux-4.5/drivers/s390/char/sclp_ctl.c", refsource: "BUGTRAQ", tags: [], url: "http://www.securityfocus.com/archive/1/538803/30/0/threaded", }, { name: "https://bugzilla.kernel.org/show_bug.cgi?id=116741", refsource: "CONFIRM", tags: [], url: "https://bugzilla.kernel.org/show_bug.cgi?id=116741", }, { name: "DSA-3616", refsource: "DEBIAN", tags: [], url: "http://www.debian.org/security/2016/dsa-3616", }, { name: "91540", refsource: "BID", tags: [], url: "http://www.securityfocus.com/bid/91540", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 1.9, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 1, impactScore: 3.6, }, }, lastModifiedDate: "2016-11-28T20:30Z", publishedDate: "2016-07-03T21:59Z", }, }, }
fkie_cve-2016-6130
Vulnerability from fkie_nvd
Published
2016-07-03 21:59
Modified
2025-04-12 10:46
Severity ?
Summary
Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 8.0 | |
linux | linux_kernel | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "2870CD78-709E-4894-8CE7-147FD70F4070", versionEndIncluding: "4.5.5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", }, { lang: "es", value: "Condición de carrera en la función sclp_ctl_ioctl_sccb en drivers/s390/char/sclp_ctl.c en el kernel de Linux en versiones anteriores a 4.6 permite a usuarios locales obtener información sensible de la memoria del kernel cambiando un valor de longitud determinado, también conocida como una vulnerabilidad \"double fetch\".", }, ], id: "CVE-2016-6130", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 1.9, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 1, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-07-03T21:59:18.040", references: [ { source: "cve@mitre.org", url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2016/dsa-3616", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/538803/30/0/threaded", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/91540", }, { source: "cve@mitre.org", url: "https://bugzilla.kernel.org/show_bug.cgi?id=116741", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2016/dsa-3616", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/538803/30/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/91540", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.kernel.org/show_bug.cgi?id=116741", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-362", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.