SUSE-SU-2017:0437-1

Source
https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:0437-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2017:0437-1
Related
Published
2017-02-09T15:37:43Z
Modified
2017-02-09T15:37:43Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-94 to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2017-5551: tmpfs: clear S_ISGID when setting posix ACLs (bsc#1021258).
  • CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device NOTE: this vulnerability existed because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
  • CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#989152).
  • CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provided an incomplete set of requirements for setattr operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
  • CVE-2016-8632: The tipcmsgbuild function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAPNETADMIN capability (bnc#1008831).
  • CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. (bnc#1014746).
  • CVE-2016-9793: The socksetsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sksndbuf and skrcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAPNETADMIN capability for a crafted setsockopt system call with the (1) SOSNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
  • CVE-2012-6704: The socksetsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sksndbuf and skrcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAPNETADMIN capability for a crafted setsockopt system call with the (1) SOSNDBUF or (2) SO_RCVBUF option (bnc#1013542).
  • CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
  • CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfsattrlist.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
  • CVE-2015-8962: Double free vulnerability in the sgcommonwrite function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
  • CVE-2016-9555: The sctpsfootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
  • CVE-2016-7910: Use-after-free vulnerability in the diskseqfstop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
  • CVE-2016-7911: Race condition in the gettaskioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
  • CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address (bnc#853052).
  • CVE-2015-8964: The ttysettermiosldisc function in drivers/tty/ttyldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
  • CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).
  • CVE-2016-8646: The hashaccept function in crypto/algifhash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).
  • CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).

The following non-security bugs were fixed:

  • 8250_pci: Fix potential use-after-free in error path (bsc#1013070).
  • KABI fix (bsc#1014410).
  • apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
  • be2net: Do not leak iomapped memory on removal (bug#925065).
  • blockdev: do not test bdev->bdcontains when it is not stable (bsc#1008557).
  • bna: Add synchronization for tx ring (bsc#993739).
  • bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
  • crypto: add ghash-generic in the supported.conf(bsc#1016824)
  • crypto: aesni - Add support for 192 & 256 bit keys to AESNI RFC4106 (bsc#913387).
  • dm: do not call dmsynctable() when creating new devices (bnc#901809).
  • drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)
  • ext3: Avoid premature failure of ext3hasfree_blocks() (bsc#1016668).
  • ext4: do not leave icrtime.tvsec uninitialized (bsc#1013018).
  • ext4: fix reference counting bug on block allocation error (bsc#1013018).
  • futex: Acknowledge a new waiter in counter before plist (bsc#851603).
  • futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).
  • hpilo: Add support for iLO5 (bsc#999101).
  • ibmveth: calculate gso_segs for large packets (bsc#1019165).
  • ibmveth: set correct gsosize and gsotype (bsc#1019165).
  • igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491 FATE#317388).
  • igb: Fix NULL assignment to incorrect variable in igbresetq_vector (bsc#795297 FATE#313656).
  • igb: Fix oops caused by missing queue pairing (bsc#909491 FATE#317388).
  • igb: Fix oops on changing number of rings (bsc#909491 FATE#317388).
  • igb: Remove unnecessary flag setting in igbsetflagqueuepairs() (bsc#909491 FATE#317388).
  • igb: Unpair the queues when changing the number of queues (bsc#909491 FATE#317388).
  • kexec: add a kexeccrashloaded() function (bsc#973691).
  • kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).
  • kvm: Distangle eventfd code from irqchip (bsc#989680).
  • kvm: Iterate over only vcpus that are preempted (bsc#989680).
  • kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).
  • kvm: VMX: Pass vcpu to _vmxcomplete_interrupts (bsc#989680).
  • kvm: fold kvmpittimer into kvmkpitstate (bsc#989680).
  • kvm: make processes waiting on vcpu mutex killable (bsc#989680).
  • kvm: nVMX: Add preemption timer support (bsc#989680).
  • kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).
  • kvm: use symbolic constant for nr interrupts (bsc#989680).
  • kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).
  • kvm: x86: Run PIT work in own kthread (bsc#989680).
  • kvm: x86: limit difference between kvmclock updates (bsc#989680).
  • libata: introduce atahost->ntags to avoid oops on SAS controllers (bsc#871728).
  • libata: remove n_tags to avoid kABI breakage (bsc#871728).
  • libfc: Do not take rdata->rpmutex when processing a -FCEX_CLOSED ELS response (bsc#962846).
  • libfc: Fixup disc_mutex handling (bsc#962846).
  • libfc: Issue PRLI after a PRLO has been received (bsc#962846).
  • libfc: Revisit kref handling (bnc#990245).
  • libfc: Update rport reference counting (bsc#953233).
  • libfc: do not send ABTS when resetting exchanges (bsc#962846).
  • libfc: fixup locking of ptp_setup() (bsc#962846).
  • libfc: reset exchange manager during LOGO handling (bsc#962846).
  • libfc: send LOGO for PLOGI failure (bsc#962846).
  • locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).
  • memstick: mspro_block: add missing curly braces (bsc#1016688).
  • mlx4: Fix error flow when sending mads under SRIOV (bsc#786036 FATE#314304).
  • mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036 FATE#314304).
  • mlx4: Fix memory leak if QP creation failed (bsc#786036 FATE#314304).
  • mlx4: Fix potential deadlock when sending mad to wire (bsc#786036 FATE#314304).
  • mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036 FATE#314304).
  • mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036 FATE#314304).
  • mlx4: add missing braces in verifyqpparameters (bsc#786036 FATE#314304).
  • mm/memoryhotplug.c: check for missing sections in testpagesina_zone() (bnc#961589).
  • mm: fix crashes from mbind() merging vmas (bnc#1005877).
  • mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
  • mremap: enforce rmap src/dst vma ordering in case of vmamerge() succeeding in copyvma() (bsc#1008645).
  • net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036 FATE#314304).
  • net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382 FATE#317529).
  • net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036 FATE#314304).
  • net/mlx4core: Do not BUGON during reset when PCI is offline (bsc#924708).
  • net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708).
  • net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bsc#919382 FATE#317529).
  • net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036 FATE#314304).
  • net/mlx4core: Implement pciresume callback (bsc#924708).
  • net/mlx4core: Update the HCA core clock frequency after INITPORT (bug#919382 FATE#317529).
  • net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382 FATE#317529).
  • net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382 FATE#317529).
  • net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036 FATE#314304).
  • net/mlx4_en: Move filters cleanup to a proper location (bsc#786036 FATE#314304).
  • net/mlx4en: Remove dependency between timestamping capability and servicetask (bsc#919382 FATE#317529).
  • net/mlx4_en: fix spurious timestamping callbacks (bsc#919382 FATE#317529).
  • netfront: do not truncate grant references.
  • nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
  • nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
  • nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).
  • nvme: Automatic namespace rescan (bsc#1017686).
  • nvme: Metadata format support (bsc#1017686).
  • ocfs2: fix BUGON() in ocfs2ci_checkpointed() (bnc#1019783).
  • posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
  • posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
  • posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
  • powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201).
  • powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201).
  • powerpc/numa: Fix multiple bugs in memoryhotplugmax() (bsc#1010201).
  • powerpc/pseries: Use HCLEARHPT to clear MMU hash table during kexec (bsc#1003813).
  • powerpc: fix typo 'CONFIGPPCCPU' (bsc#1010201).
  • powerpc: scanfeatures() updates incorrect bits for REALLE (bsc#1010201).
  • printk/sched: Introduce special printk_sched() for those awkward (bsc#996541).
  • ptrace: _ptracemay_access() should not deny sub-threads (bsc#1012851).
  • qlcnic: fix a loop exit condition better (bsc#909350 FATE#317546).
  • qlcnic: use the correct ring in qlcnic83xxprocessrcvring_diag() (bnc#800999 FATE#313899).
  • reiserfs: fix race in prealloc discard (bsc#987576).
  • rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again
  • rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
  • rt2x00: fix rfkill regression on rt2500pci (bnc#748806).
  • s390/zcrypt: kernel: Fix invalid domain response handling (bsc#1016320).
  • scsi: Fix erratic device offline during EH (bsc#993832).
  • scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
  • scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
  • scsi_error: count medium access timeout only once per EH run (bsc#993832).
  • scsierror: fixup crash in scsieh_reset (bsc#993832)
  • serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).
  • sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
  • sunrpc: Fix reconnection timeouts (bsc#1014410).
  • sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).
  • sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
  • tcp: fix inet6cskroute_req() for link-local addresses (bsc#1010175).
  • tcp: pass fl6 to inet6cskroute_req() (bsc#1010175).
  • tcp: plug dst leak in tcpv6conn_request() (bsc#1010175).
  • tcp: use inet6cskroutereq() in tcpv6sendsynack() (bsc#1010175).
  • tg3: Fix temperature reporting (bnc#790588 FATE#313912).
  • usb: console: fix potential use after free (bsc#1015817).
  • usb: console: fix uninitialised ldisc semaphore (bsc#1015817).
  • usb: cp210x: Corrected USB request type definitions (bsc#1015932).
  • usb: cp210x: relocate private data from USB interface to port (bsc#1015932).
  • usb: cp210x: work around cp2108 GETLINECTL bug (bsc#1015932).
  • usb: ftdi_sio: fix null deref at port probe (bsc#1015796).
  • usb: ipaq.c: fix a timeout loop (bsc#1015848).
  • usb: opticon: fix non-atomic allocation in write path (bsc#1015803).
  • usb: option: fix runtime PM handling (bsc#1015752).
  • usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).
  • usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).
  • usb: serial: cp210x: add new access functions for large registers (bsc#1015932).
  • usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).
  • usb: serial: fix potential use-after-free after failed probe (bsc#1015828).
  • usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).
  • usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).
  • usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).
  • usb: sierra: fix AA deadlock in open error path (bsc#1015561).
  • usb: sierra: fix remote wakeup (bsc#1015561).
  • usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).
  • usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).
  • usb: sierra: fix use after free at suspend/resume (bsc#1015561).
  • usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).
  • usb: usb_wwan: fix race between write and resume (bsc#1015760).
  • usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).
  • usb: usb_wwan: fix urb leak in write error path (bsc#1015760).
  • usb: usb_wwan: fix write and suspend race (bsc#1015760).
  • usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
  • usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).
  • xenbus: do not invoke is_ready() for most device states (bsc#987333).
References

Affected packages

SUSE:Linux Enterprise Software Development Kit 11 SP4 / kernel-docs

Package

Name
kernel-docs
Purl
purl:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.2

Ecosystem specific

{
    "binaries": [
        {
            "kernel-docs": "3.0.101-94.2"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-bigmem

Package

Name
kernel-bigmem
Purl
purl:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-ec2

Package

Name
kernel-ec2
Purl
purl:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-pae

Package

Name
kernel-pae
Purl
purl:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-ppc64

Package

Name
kernel-ppc64
Purl
purl:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-trace

Package

Name
kernel-trace
Purl
purl:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / kernel-xen

Package

Name
kernel-xen
Purl
purl:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-bigmem

Package

Name
kernel-bigmem
Purl
purl:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-ec2

Package

Name
kernel-ec2
Purl
purl:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-pae

Package

Name
kernel-pae
Purl
purl:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-ppc64

Package

Name
kernel-ppc64
Purl
purl:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-trace

Package

Name
kernel-trace
Purl
purl:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / kernel-xen

Package

Name
kernel-xen
Purl
purl:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-94.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-94.1",
            "kernel-default-man": "3.0.101-94.1",
            "kernel-ec2": "3.0.101-94.1",
            "kernel-default": "3.0.101-94.1",
            "kernel-source": "3.0.101-94.1",
            "kernel-bigmem": "3.0.101-94.1",
            "kernel-pae-base": "3.0.101-94.1",
            "kernel-syms": "3.0.101-94.1",
            "kernel-bigmem-base": "3.0.101-94.1",
            "kernel-pae": "3.0.101-94.1",
            "kernel-ppc64-devel": "3.0.101-94.1",
            "kernel-ec2-devel": "3.0.101-94.1",
            "kernel-ppc64-base": "3.0.101-94.1",
            "kernel-trace-devel": "3.0.101-94.1",
            "kernel-trace": "3.0.101-94.1",
            "kernel-ec2-base": "3.0.101-94.1",
            "kernel-ppc64": "3.0.101-94.1",
            "kernel-xen-base": "3.0.101-94.1",
            "kernel-xen-devel": "3.0.101-94.1",
            "kernel-bigmem-devel": "3.0.101-94.1",
            "kernel-trace-base": "3.0.101-94.1",
            "kernel-default-devel": "3.0.101-94.1",
            "kernel-pae-devel": "3.0.101-94.1",
            "kernel-xen": "3.0.101-94.1"
        }
    ]
}