SUSE-SU-2017:1183-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1183-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2017:1183-1
Related
Published
2017-05-05T08:13:00Z
Modified
2017-05-05T08:13:00Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.58 to receive various security and bugfixes.

Notable new/improved features: - Improved support for Hyper-V - Support for Matrox G200eH3 - Support for tcp_westwood

The following security bugs were fixed:

  • CVE-2017-2671: The pingunhash function in net/ipv4/ping.c in the Linux kernel was too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTOICMP in a socket system call (bnc#1031003).
  • CVE-2017-7308: The packetsetring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579).
  • CVE-2017-7294: The vmwsurfacedefineioctl function in drivers/gpu/drm/vmwgfx/vmwgfxsurface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).
  • CVE-2017-7261: The vmwsurfacedefineioctl function in drivers/gpu/drm/vmwgfx/vmwgfxsurface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZEROSIZEPTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).
  • CVE-2017-7187: The sgioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SGNEXTCMDLEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).
  • CVE-2017-7374: Use-after-free vulnerability in fs/crypto/ in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely (bnc#1032006).
  • CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCKZAPPED status, related to net/l2tp/l2tpip.c and net/l2tp/l2tp_ip6.c (bnc#1028415).
  • CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190).
  • CVE-2017-6346: Race condition in net/packet/afpacket.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKETFANOUT setsockopt system calls (bnc#1027189).
  • CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066).
  • CVE-2017-6214: The tcpspliceread function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722).
  • CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697).
  • CVE-2017-6347: The ipcmsgrecvchecksum function in net/ipv4/ipsockglue.c in the Linux kernel had incorrect expectations about skb data layout, which allowed local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission (bnc#1027179).
  • CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application (bnc#1008842).
  • CVE-2017-2596: The nestedvmxcheck_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel improperly emulated the VMXON instruction, which allowed KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references (bnc#1022785).
  • CVE-2017-6074: The dccprcvstateprocess function in net/dccp/input.c in the Linux kernel mishandled DCCPPKTREQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6RECVPKTINFO setsockopt system call (bnc#1026024).

The following non-security bugs were fixed:

  • ACPI, ioapic: Clear on-stack resource before using it (bsc#1028819).
  • ACPI: Do not create a platform_device for IOAPIC/IOxAPIC (bsc#1028819).
  • ACPI: Remove platform devices from a bus on removal (bsc#1028819).
  • HID: usbhid: Quirk a AMI virtual mouse and keyboard with ALWAYS_POLL (bsc#1022340).
  • NFS: do not try to cross a mountpount when there isn't one there (bsc#1028041).
  • NFS: flush out dirty data on file fput() (bsc#1021762).
  • PCI: hv: Fix wslottodevfn() to fix warnings on device removal (bug#1028217).
  • PCI: hv: Use device serial number as PCI domain (bug#1028217).
  • RAID1: a new I/O barrier implementation to remove resync window (bsc#998106,bsc#1020048,bsc#982783).
  • RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#998106,bsc#1020048,bsc#982783).
  • Revert 'RDMA/core: Fix incorrect structure packing for booleans' (kabi).
  • Revert 'give up on gcc ilog2() constant optimizations' (kabi).
  • Revert 'net/mlx4en: Avoid unregisternetdev at shutdown flow' (bsc#1028017).
  • Revert 'net: introduce device minheaderlen' (kabi).
  • Revert 'nfit, libnvdimm: fix interleave set cookie calculation' (kabi).
  • Revert 'target: Fix NULL dereference during LUN lookup + active I/O shutdown' (kabi).
  • acpi, nfit: fix acpinfitflush_probe() crash (bsc#1031717).
  • acpi, nfit: fix extended status translations for ACPI DSMs (bsc#1031717).
  • arm64: Use full path in KBUILD_IMAGE definition (bsc#1010032).
  • arm64: hugetlb: fix the wrong address for several functions (bsc#1032681).
  • arm64: hugetlb: fix the wrong return value for hugeptepsetaccessflags (bsc#1032681).
  • arm64: hugetlb: remove the wrong pmd check in findnumcontig() (bsc#1032681).
  • arm: Use full path in KBUILD_IMAGE definition (bsc#1010032).
  • bnx2x: allow adding VLANs while interface is down (bsc#1027273).
  • bonding: fix 802.3ad aggregator reselection (bsc#1029514).
  • btrfs: Change qgroupmetarsv to 64bit (bsc#1019614).
  • btrfs: allow unlink to exceed subvolume quota (bsc#1019614).
  • btrfs: backref: Fix soft lockup in _mergerefs function (bsc#1017641).
  • btrfs: incremental send, do not delay rename when parent inode is new (bsc#1028325).
  • btrfs: incremental send, do not issue invalid rmdir operations (bsc#1028325).
  • btrfs: qgroup: Move half of the qgroup accounting time out of commit trans (bsc#1017461).
  • btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1019614).
  • btrfs: send, fix failure to rename top level inode due to name collision (bsc#1028325).
  • btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844 bsc#1024015)
  • cgroup/pids: remove spurious suspicious RCU usage warning (bnc#1031831).
  • crypto: algif_hash - avoid zero-sized array (bnc#1007962).
  • cxgb4vf: do not offload Rx checksums for IPv6 fragments (bsc#1026692).
  • device-dax: fix private mapping restriction, permit read-only (bsc#1031717).
  • drm/i915: Add inteluncoresuspend / resume functions (bsc#1011913).
  • drm/i915: Fix crash after S3 resume with DP MST mode change (bsc#1029634).
  • drm/i915: Listen for PMIC bus access notifications (bsc#1011913).
  • drm/i915: Only enable hotplug interrupts if the display interrupts are enabled (bsc#1031717).
  • drm/mgag200: Added support for the new device G200eH3 (bsc#1007959)
  • ext4: fix fencepost in sfirstmeta_bg validation (bsc#1029986).
  • futex: Add missing error handling to FUTEXREQUEUEPI (bsc#969755).
  • futex: Fix potential use-after-free in FUTEXREQUEUEPI (bsc#969755).
  • hv: export current Hyper-V clocksource (bsc#1031206).
  • hv: util: do not forget to init host_ts.lock (bsc#1031206).
  • hv: vmbus: Prevent sending data on a rescinded channel (bug#1028217).
  • hv_utils: implement Hyper-V PTP source (bsc#1031206).
  • i2c-designware: increase timeout (bsc#1011913).
  • i2c: designware-baytrail: Acquire P-Unit access on bus acquire (bsc#1011913).
  • i2c: designware-baytrail: Call pmicbusaccessnotifierchain (bsc#1011913).
  • i2c: designware-baytrail: Fix race when resetting the semaphore (bsc#1011913).
  • i2c: designware-baytrail: Only check iosfmbiavailable() for shared hosts (bsc#1011913).
  • i2c: designware: Disable pm for PMIC i2c-bus even if there is no _SEM method (bsc#1011913).
  • i2c: designware: Never suspend i2c-busses used for accessing the system PMIC (bsc#1011913).
  • i2c: designware: Rename accessor_flags to flags (bsc#1011913).
  • iommu/vt-d: Make sure IOMMUs are off when intel_iommu=off (bsc#1031208).
  • kABI: protect struct iscsi_conn (kabi).
  • kABI: protect struct senodeacl (kabi).
  • kABI: restore canrxregister parameters (kabi).
  • kgr/module: make a taint flag module-specific
  • kgr: Mark eeheventhandler() kthread safe using a timeout (bsc#1031662).
  • kgr: remove all arch-specific kgraft header files
  • l2tp: fix address test in _l2tpip6bindlookup() (bsc#1028415).
  • l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).
  • l2tp: fix racy socket lookup in l2tpip and l2tpip6 bind() (bsc#1028415).
  • l2tp: hold socket before dropping lock in l2tpip{, 6}recv() (bsc#1028415).
  • l2tp: hold tunnel socket when handling control frames in l2tpip and l2tpip6 (bsc#1028415).
  • l2tp: lock socket before checking flags in connect() (bsc#1028415).
  • libnvdimm, pfn: fix memmap reservation size versus 4K alignment (bsc#1031717).
  • locking/semaphore: Add downinterruptibletimeout() (bsc#1031662).
  • md/raid1: Refactor raid1makerequest (bsc#998106,bsc#1020048,bsc#982783).
  • md/raid1: add rcu protection to rdev in fixreaderror (References: bsc#998106,bsc#1020048,bsc#982783).
  • md/raid1: fix a use-after-free bug (bsc#998106,bsc#1020048,bsc#982783).
  • md/raid1: handle flush request correctly (bsc#998106,bsc#1020048,bsc#982783).
  • mm/hugememory.c: respect FOLLFORCE/FOLL_COW for thp (bnc#1030118).
  • mm/memblock.c: fix memblocknextvalid_pfn() (bnc#1031200).
  • mm/pagealloc: Remove useless parameter of _freepagesboot_core (bnc#1027195).
  • mm: fix set pageblock migratetype in deferred struct page init (bnc#1027195).
  • mm: page_alloc: skip over regions of invalid pfns where possible (bnc#1031200).
  • module: move addtaintmodule() to a header file
  • net/ena: change condition for host attribute configuration (bsc#1026509).
  • net/ena: change driver's default timeouts (bsc#1026509).
  • net/ena: fix NULL dereference when removing the driver after device reset failed (bsc#1026509).
  • net/ena: fix RSS default hash configuration (bsc#1026509).
  • net/ena: fix ethtool RSS flow configuration (bsc#1026509).
  • net/ena: fix potential access to freed memory during device reset (bsc#1026509).
  • net/ena: fix queues number calculation (bsc#1026509).
  • net/ena: reduce the severity of ena printouts (bsc#1026509).
  • net/ena: refactor enagetstats64 to be atomic context safe (bsc#1026509).
  • net/ena: remove ntuple filter support from device feature list (bsc#1026509).
  • net/ena: update driver version to 1.1.2 (bsc#1026509).
  • net/ena: use READ_ONCE to access completion descriptors (bsc#1026509).
  • net/mlx4_core: Avoid command timeouts during VF driver device shutdown (bsc#1028017).
  • net/mlx4_core: Avoid delays during VF driver device shutdown (bsc#1028017).
  • net/mlx4_core: Fix racy CQ (Completion Queue) free (bsc#1028017).
  • net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#1028017).
  • net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#1028017).
  • net/mlx4_en: Fix bad WQE issue (bsc#1028017).
  • net: ena: Fix error return code in enadeviceinit() (bsc#1026509).
  • net: ena: Remove unnecessary pcisetdrvdata() (bsc#1026509).
  • net: ena: change the return type of enasetpush_mode() to be void (bsc#1026509).
  • net: ena: remove superfluous check in ena_remove() (bsc#1026509).
  • net: ena: use setuptimer() and modtimer() (bsc#1026509).
  • netfilter: allow logging from non-init namespaces (bsc#970083).
  • nvme: Do not suspend admin queue that wasn't created (bsc#1026505).
  • nvme: Suspend all queues before deletion (bsc#1026505).
  • ping: implement proper locking (bsc#1031003).
  • powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).
  • rtlwifi: rtl_usb: Fix missing entry in USB driver's private data (bsc#1026462).
  • s390/kmsg: add missing kmsg descriptions (bnc#1025683).
  • s390/mm: fix zone calculation in archaddmemory() (bnc#1025683).
  • sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419).
  • scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#1027054).
  • scsidhalua: Do not modify the interval value for retries (bsc#1012910).
  • softirq: Let ksoftirqd do its job (bsc#1019618).
  • x86, mm: fix guppterange() vs DAX mappings (bsc#1026405).
  • x86/apic/uv: Silence a shift wrapping warning (bsc#1023866).
  • x86/ioapic: Change prototype of acpiioapicadd() (bsc#1027153, bsc#1027616).
  • x86/ioapic: Fix IOAPIC failing to request resource (bsc#1027153, bsc#1027616).
  • x86/ioapic: Fix incorrect pointers in ioapicsetupresources() (bsc#1027153, bsc#1027616).
  • x86/ioapic: Fix lost IOAPIC resource after hot-removal and hotadd (bsc#1027153, bsc#1027616).
  • x86/ioapic: Fix setup_res() failing to get resource (bsc#1027153, bsc#1027616).
  • x86/ioapic: Ignore root bridges without a companion ACPI device (bsc#1027153, bsc#1027616).
  • x86/ioapic: Simplify ioapicsetupresources() (bsc#1027153, bsc#1027616).
  • x86/ioapic: Support hot-removal of IOAPICs present during boot (bsc#1027153, bsc#1027616).
  • x86/ioapic: fix kABI (hide added include) (bsc#1027153, bsc#1027616).
  • x86/mce: Do not print MCEs when mcelog is active (bsc#1013994).
  • x86/mce: Fix copy/paste error in exception table entries
  • x86/mm/gup: Simplify getuserpages() PTE bit handling (bsc#1026405).
  • x86/platform/UV: Add Support for UV4 Hubless NMIs (bsc#1023866).
  • x86/platform/UV: Add Support for UV4 Hubless systems (bsc#1023866).
  • x86/platform/UV: Add basic CPU NMI health check (bsc#1023866).
  • x86/platform/UV: Clean up the NMI code to match current coding style (bsc#1023866).
  • x86/platform/UV: Clean up the UV APIC code (bsc#1023866).
  • x86/platform/UV: Ensure uvsysteminit is called when necessary (bsc#1023866).
  • x86/platform/UV: Fix 2 socket config problem (bsc#1023866).
  • x86/platform/UV: Fix panic with missing UVsystab support (bsc#1023866).
  • x86/platform/UV: Initialize PCH GPPD0 NMI Pin to be NMI source (bsc#1023866).
  • x86/platform/UV: Verify NMI action is valid, default is standard (bsc#1023866).
  • x86/platform/intel/iosf_mbi: Add a PMIC bus access notifier (bsc#1011913).
  • x86/platform/intel/iosf_mbi: Add a mutex for P-Unit access (bsc#1011913).
  • x86/platform: Remove warning message for duplicate NMI handlers (bsc#1029220).
  • x86/ras/therm_throt: Do not log a fake MCE for thermal events (bsc#1028027).
  • xen-blkfront: correct maximum segment accounting (bsc#1018263).
  • xen-blkfront: do not call talktoblkback when already connected to blkback.
  • xen-blkfront: free resources if xlvbdallocgendisk fails.
  • xen/blkfront: Fix crash if backend does not follow the right states.
  • xen/netback: set default upper limit of tx/rx queues to 8 (bnc#1019163).
  • xen/netfront: set default upper limit of tx/rx queues to 8 (bnc#1019163).
  • xen: Use machine addresses in /sys/kernel/vmcoreinfo when PV (bsc#1014136)
  • xfs: do not take the IOLOCK exclusive for direct I/O page invalidation (bsc#1015609).
  • xgene_enet: remove bogus forward declarations (bsc#1032673).
References

Affected packages

SUSE:Linux Enterprise Desktop 12 SP2 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.3

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-default-extra": "4.4.59-92.17.3",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Desktop 12 SP2 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.2

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-default-extra": "4.4.59-92.17.3",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Desktop 12 SP2 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.2

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-default-extra": "4.4.59-92.17.3",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise High Availability Extension 12 SP2 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.3

Ecosystem specific

{
    "binaries": [
        {
            "dlm-kmp-default": "4.4.59-92.17.3",
            "gfs2-kmp-default": "4.4.59-92.17.3",
            "cluster-network-kmp-default": "4.4.59-92.17.3",
            "ocfs2-kmp-default": "4.4.59-92.17.3",
            "cluster-md-kmp-default": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Live Patching 12 / kgraft-patch-SLE12-SP2_Update_7

Package

Name
kgraft-patch-SLE12-SP2_Update_7
Purl
purl:rpm/suse/kgraft-patch-SLE12-SP2_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1-2.3

Ecosystem specific

{
    "binaries": [
        {
            "kgraft-patch-4_4_59-92_17-default": "1-2.3"
        }
    ]
}

SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.3

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default-base": "4.4.59-92.17.3",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.2

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default-base": "4.4.59-92.17.3",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.2

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default-base": "4.4.59-92.17.3",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Software Development Kit 12 SP2 / kernel-docs

Package

Name
kernel-docs
Purl
purl:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.8

Ecosystem specific

{
    "binaries": [
        {
            "kernel-docs": "4.4.59-92.17.8",
            "kernel-obs-build": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Software Development Kit 12 SP2 / kernel-obs-build

Package

Name
kernel-obs-build
Purl
purl:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.3

Ecosystem specific

{
    "binaries": [
        {
            "kernel-docs": "4.4.59-92.17.8",
            "kernel-obs-build": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP2 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.3

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default-base": "4.4.59-92.17.3",
            "kernel-default-man": "4.4.59-92.17.3",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP2 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.2

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default-base": "4.4.59-92.17.3",
            "kernel-default-man": "4.4.59-92.17.3",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP2 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.2

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default-base": "4.4.59-92.17.3",
            "kernel-default-man": "4.4.59-92.17.3",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP2 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.3

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default-base": "4.4.59-92.17.3",
            "kernel-default-man": "4.4.59-92.17.3",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP2 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.2

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default-base": "4.4.59-92.17.3",
            "kernel-default-man": "4.4.59-92.17.3",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP2 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.2

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.59-92.17.2",
            "kernel-devel": "4.4.59-92.17.2",
            "kernel-default-base": "4.4.59-92.17.3",
            "kernel-default-man": "4.4.59-92.17.3",
            "kernel-default": "4.4.59-92.17.3",
            "kernel-source": "4.4.59-92.17.2",
            "kernel-syms": "4.4.59-92.17.2",
            "kernel-default-devel": "4.4.59-92.17.3"
        }
    ]
}

SUSE:Linux Enterprise Workstation Extension 12 SP2 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.59-92.17.3

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-extra": "4.4.59-92.17.3"
        }
    ]
}