SUSE-SU-2017:1301-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1301-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2017:1301-1
Related
Published
2017-05-15T15:06:35Z
Modified
2017-05-15T15:06:35Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Notable new features:

  • Toleration of newer crypto hardware for z Systems
  • USB 2.0 Link power management for Haswell-ULT

The following security bugs were fixed:

  • CVE-2017-7308: The packetsetring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)
  • CVE-2017-2671: The pingunhash function in net/ipv4/ping.c in the Linux kernel was too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTOICMP in a socket system call (bnc#1031003)
  • CVE-2017-7184: The xfrmreplayverifylen function in net/xfrm/xfrmuser.c in the Linux kernel did not validate certain size data after an XFRMMSGNEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAPNETADMIN capability (bsc#1030573).
  • CVE-2017-5970: The ipv4pktinfoprepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bsc#1024938).
  • CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bsc#1033336).
  • CVE-2017-7294: The vmwsurfacedefineioctl function in drivers/gpu/drm/vmwgfx/vmwgfxsurface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
  • CVE-2017-7261: The vmwsurfacedefineioctl function in drivers/gpu/drm/vmwgfx/vmwgfxsurface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZEROSIZEPTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)
  • CVE-2017-7187: The sgioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SGNEXTCMDLEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)
  • CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178)
  • CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914)
  • CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero (bsc#979021).
  • CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCKZAPPED status, related to net/l2tp/l2tpip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)
  • CVE-2016-5243: The tipcnlcompatlinkdump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212)
  • CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application (bnc#1027066)
  • CVE-2017-6214: The tcpspliceread function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)
  • CVE-2017-6074: The dccprcvstateprocess function in net/dccp/input.c in the Linux kernel mishandled DCCPPKTREQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6RECVPKTINFO setsockopt system call (bnc#1026024)
  • CVE-2017-5986: Race condition in the sctpwaitfor_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235)
  • CVE-2015-8970: crypto/algifskcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AFALG socket an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c (bsc#1008374).

The following non-security bugs were fixed:

  • NFSD: do not risk using duplicate owner/file/delegation ids (bsc#1029212).
  • RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#982783, bsc#1026260).
  • SUNRPC: Clean up the slot table allocation (bsc#1013862).
  • SUNRPC: Initalise the struct xprt upon allocation (bsc#1013862).
  • USB: cdc-acm: fix broken runtime suspend (bsc#1033771).
  • USB: cdc-acm: fix open and suspend race (bsc#1033771).
  • USB: cdc-acm: fix potential urb leak and PM imbalance in write (bsc#1033771).
  • USB: cdc-acm: fix runtime PM for control messages (bsc#1033771).
  • USB: cdc-acm: fix runtime PM imbalance at shutdown (bsc#1033771).
  • USB: cdc-acm: fix shutdown and suspend race (bsc#1033771).
  • USB: cdc-acm: fix write and resume race (bsc#1033771).
  • USB: cdc-acm: fix write and suspend race (bsc#1033771).
  • USB: hub: Fix crash after failure to read BOS descriptor
  • USB: serial: iuu_phoenix: fix NULL-deref at open (bsc#1033794).
  • USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
  • USB: serial: mos7720: fix NULL-deref at open (bsc#1033816).
  • USB: serial: mos7720: fix parallel probe (bsc#1033816).
  • USB: serial: mos7720: fix parport use-after-free on probe errors (bsc#1033816).
  • USB: serial: mos7720: fix use-after-free on probe errors (bsc#1033816).
  • USB: serial: mos7840: fix NULL-deref at open (bsc#1034026).
  • USB: xhci-mem: use passed in GFP flags instead of GFP_KERNEL (bsc#1023014).
  • Update metadata for serial fixes (bsc#1013070)
  • Use PFLESSTHROTTLE in loop device thread (bsc#1027101).
  • clocksource: Remove 'weak' from clocksourcedefaultclock() declaration (bnc#1013018).
  • dlm: backport 'fix lvb invalidation conditions' (bsc#1005651).
  • drm/mgag200: Add support for G200e rev 4 (bnc#995542, comment #81)
  • enic: set skb->hash type properly (bsc#911105).
  • ext4: fix mballoc breakage with 64k block size (bsc#1013018).
  • ext4: fix stack memory corruption with 64k block size (bsc#1013018).
  • ext4: reject inodes with negative size (bsc#1013018).
  • fuse: initialize fc->release before calling it (bsc#1013018).
  • i40e/i40evf: Break up xmitdescriptorcount from maybestoptx (bsc#985561).
  • i40e/i40evf: Fix mixed size frags and linearization (bsc#985561).
  • i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).
  • i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).
  • i40e: Fix TSO with more than 8 frags per segment issue (bsc#985561).
  • i40e: Impose a lower limit on gso size (bsc#985561).
  • i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).
  • i40e: avoid null pointer dereference (bsc#909486).
  • jbd: Fix oops in journalremovejournal_head() (bsc#1017143).
  • jbd: do not wait (forever) for stale tid caused by wraparound (bsc#1020229).
  • kABI: mask struct xfs_icdinode change (bsc#1024788).
  • kabi: Protect xfsmount and xfsbuftarg (bsc#1024508).
  • kabi: fix (bsc#1008893).
  • lockd: use init_utsname for id encoding (bsc#1033804).
  • lockd: use rpc client's cl_nodename for id encoding (bsc#1033804).
  • md linear: fix a race between linearadd() and linearcongested() (bsc#1018446).
  • md/linear: shutup lockdep warnning (bsc#1018446).
  • mm/mempolicy.c: do not put mempolicy before using its nodemask (bnc#931620).
  • ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1013018).
  • ocfs2: fix crash caused by stale lvb with fsdlm plugin (bsc#1013800).
  • ocfs2: fix error return code in ocfs2infohandle_freefrag() (bsc#1013018).
  • ocfs2: null deref on allocation error (bsc#1013018).
  • pciback: only check PF if actually dealing with a VF (bsc#999245).
  • pciback: use pci_physfn() (bsc#999245).
  • posix-timers: Fix stack info leak in timer_create() (bnc#1013018).
  • powerpc,cpuidle: Dont toggle CPUIDLEFLAGIGNORE while setting smtsnoozedelay (bsc#1023163).
  • powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
  • powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).
  • powerpc/fadump: Update fadump documentation (bsc#1032141).
  • powerpc/nvram: Fix an incorrect partition merge (bsc#1016489).
  • powerpc/vdso64: Use double word compare on pointers (bsc#1016489).
  • rcu: Call out dangers of expedited RCU primitives (bsc#1008893).
  • rcu: Direct algorithmic SRCU implementation (bsc#1008893).
  • rcu: Flip ->completed only once per SRCU grace period (bsc#1008893).
  • rcu: Implement a variant of Peter's SRCU algorithm (bsc#1008893).
  • rcu: Increment upper bit only for srcureadlock() (bsc#1008893).
  • rcu: Remove fast check path from _synchronizesrcu() (bsc#1008893).
  • s390/kmsg: add missing kmsg descriptions (bnc#1025702).
  • s390/vmlogrdr: fix IUCV buffer allocation (bnc#1025702).
  • s390/zcrypt: Introduce CEX6 toleration
  • sched/core: Fix TASKDEAD race in finishtask_switch() (bnc#1013018).
  • sched/loadavg: Fix loadavg artifacts on fully idle and on fully loaded systems (bnc#1013018).
  • scsi: zfcp: do not trace pure benign residual HBA responses at default level (bnc#1025702).
  • scsi: zfcp: fix rport unblock race with LUN recovery (bnc#1025702).
  • scsi: zfcp: fix use-after-'free' in FC ingress path after TMF (bnc#1025702).
  • scsi: zfcp: fix use-after-free by not tracing WKA port open/close on failed send (bnc#1025702).
  • sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
  • tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).
  • vfs: split generic splice code from i_mutex locking (bsc#1024788).
  • virtio_scsi: fix memory leak on full queue condition (bsc#1028880).
  • vmxnet3: segCnt can be 1 for LRO packets (bsc#988065, bsc#1029770).
  • xen-blkfront: correct maximum segment accounting (bsc#1018263).
  • xen-blkfront: do not call talktoblkback when already connected to blkback.
  • xen-blkfront: free resources if xlvbdallocgendisk fails.
  • xfs: Fix lock ordering in splice write (bsc#1024788).
  • xfs: Make xfsicdinode->didmstate atomic_t (bsc#1024788).
  • xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).
  • xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
  • xfs: fix buffer overflow dmgetdirattrs/dmgetdirattrs2 (bsc#989056).
  • xfs: fix up xfsswapextent_forks inline extent handling (bsc#1023888).
  • xfs: kill xfsitruncatestart (bsc#1024788).
  • xfs: remove the inewsize field in struct xfs_inode (bsc#1024788).
  • xfs: remove the isize field in struct xfsinode (bsc#1024788).
  • xfs: remove xfsitruncatedata (bsc#1024788).
  • xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).
  • xfs: split xfsitruncatefinish (bsc#1024788).
  • xfs: split xfs_setattr (bsc#1024788).
  • xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
  • xfsdmapi: fix the debug compilation of xfsdmapi (bsc#989056).
References

Affected packages

SUSE:Linux Enterprise Software Development Kit 11 SP4 / kernel-docs

Package

Name
kernel-docs
Purl
purl:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.2

Ecosystem specific

{
    "binaries": [
        {
            "kernel-docs": "3.0.101-100.2"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-bigmem

Package

Name
kernel-bigmem
Purl
purl:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-ec2

Package

Name
kernel-ec2
Purl
purl:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-pae

Package

Name
kernel-pae
Purl
purl:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-ppc64

Package

Name
kernel-ppc64
Purl
purl:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-trace

Package

Name
kernel-trace
Purl
purl:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-xen

Package

Name
kernel-xen
Purl
purl:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-bigmem

Package

Name
kernel-bigmem
Purl
purl:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-ec2

Package

Name
kernel-ec2
Purl
purl:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-pae

Package

Name
kernel-pae
Purl
purl:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-ppc64

Package

Name
kernel-ppc64
Purl
purl:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-trace

Package

Name
kernel-trace
Purl
purl:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-xen

Package

Name
kernel-xen
Purl
purl:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-100.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-100.1",
            "kernel-default-man": "3.0.101-100.1",
            "kernel-ec2": "3.0.101-100.1",
            "kernel-default": "3.0.101-100.1",
            "kernel-source": "3.0.101-100.1",
            "kernel-bigmem": "3.0.101-100.1",
            "kernel-pae-base": "3.0.101-100.1",
            "kernel-syms": "3.0.101-100.1",
            "kernel-bigmem-base": "3.0.101-100.1",
            "kernel-pae": "3.0.101-100.1",
            "kernel-ppc64-devel": "3.0.101-100.1",
            "kernel-ec2-devel": "3.0.101-100.1",
            "kernel-ppc64-base": "3.0.101-100.1",
            "kernel-trace-devel": "3.0.101-100.1",
            "kernel-trace": "3.0.101-100.1",
            "kernel-ec2-base": "3.0.101-100.1",
            "kernel-ppc64": "3.0.101-100.1",
            "kernel-xen-base": "3.0.101-100.1",
            "kernel-xen-devel": "3.0.101-100.1",
            "kernel-bigmem-devel": "3.0.101-100.1",
            "kernel-trace-base": "3.0.101-100.1",
            "kernel-default-devel": "3.0.101-100.1",
            "kernel-pae-devel": "3.0.101-100.1",
            "kernel-xen": "3.0.101-100.1"
        }
    ]
}