SUSE-SU-2017:0464-1

Source
https://www.suse.com/support/update/announcement/2017/suse-su-20170464-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:0464-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2017:0464-1
Related
Published
2017-02-14T19:07:43Z
Modified
2017-02-14T19:07:43Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.69 to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2015-8962: Double free vulnerability in the sgcommonwrite function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
  • CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).
  • CVE-2015-8964: The ttysettermiosldisc function in drivers/tty/ttyldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
  • CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
  • CVE-2016-7910: Use-after-free vulnerability in the diskseqfstop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
  • CVE-2016-7911: Race condition in the gettaskioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
  • CVE-2016-7913: The xc2028setconfig function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).
  • CVE-2016-7914: The assocarrayinsertintoterminalnode function in lib/assocarray.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).
  • CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).
  • CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
  • CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcpipv4.c and net/ipv6/tcpipv6.c (bnc#1009969).
  • CVE-2016-9083: drivers/vfio/pci/vfiopci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIODEVICESETIRQS ioctl call, aka a 'state machine confusion bug' (bnc#1007197).
  • CVE-2016-9084: drivers/vfio/pci/vfiopciintrs.c in the Linux kernel misuses the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).
  • CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
  • CVE-2016-9793: The socksetsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sksndbuf and skrcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAPNETADMIN capability for a crafted setsockopt system call with the (1) SOSNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531 1013542).
  • CVE-2016-9806: Race condition in the netlinkdump function in net/netlink/afnetlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540 1017589).
  • CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bsc#1019851).
  • CVE-2017-2583: Fixed broken emulation of 'MOV SS, null selector' (bsc#1020602).
  • CVE-2017-5551: Clear SGID bit when setting file permissions on tmpfs (bsc#1021258).

The following non-security bugs were fixed:

  • Fixup acl reference leak and missing conversions in ext3, gfs2, jfs, hfsplus
  • RAID1: ignore discard error (bsc#1017164).
  • Update patches.suse/btrfs-8446-fix-qgroup-accounting-when-creating-snap.patch (bsc#972993).
  • blacklist: PCI fixes required only for cxl (bsc#1016713).
  • blacklist: cxl fixes on SLE12 SP1 (bsc#1016725)
  • blacklist: ibmvnic fixes on SLE12 SP1 (bsc#1016961)
  • blockdev: do not test bdev->bdcontains when it is not stable (bsc#1008557).
  • bna: Add synchronization for tx ring (bsc#993739).
  • bnx2i/bnx2fc : fix randconfig error in next-20140909 (bsc#922052 fate#318602 bsc#922056 FATE#318604).
  • bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
  • bnx2x: fix lockdep splat (bsc#922052 fate#318602 bsc#922056 FATE#318604).
  • btrfs: Ensure proper sector alignment for btrfsfreereserveddataspace (bsc#1005666).
  • btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c (bsc#983087).
  • btrfs: Revert 'Btrfs: do not delay inode ref updates during log replay' (bsc#987192).
  • btrfs: bugfix: handle FSIOC32{GETFLAGS,SETFLAGS,GETVERSION} in btrfs_ioctl (bsc#1018100).
  • btrfs: do not delay inode ref updates during log replay (bsc#987192).
  • btrfs: fix incremental send failure caused by balance (bsc#985850).
  • btrfs: fix relocation incorrectly dropping data references (bsc#990384).
  • btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709).
  • btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc#983087).
  • btrfs: remove old treeroot dirent processing in btrfsreal_readdir() (bsc#981709).
  • btrfs: send, do not bug on inconsistent snapshots (bsc#985850).
  • cpufreq: intel_pstate: Fix divide by zero on Knights Landing (KNL) (bsc#1008876).
  • ext4: fix data exposure after a crash (bsc#1012985).
  • fs: avoid including 'mountproto=' with no protocol in /proc/mounts (bsc#1019260).
  • fuse: do not use iocb after it may have been freed (bsc#1012985).
  • hpilo: Add support for iLO5 (bsc#999101).
  • ib/core: Avoid unsigned int overflow in sgalloctable (bsc#924381 FATE#318568 bsc#921338).
  • ib/mlx5: Fix FW version diaplay in sysfs (bnc#923036 FATE#318772).
  • ib/mlx5: Fix entries check in mlx5ibresize_cq (bnc#858727 FATE#315946).
  • ib/mlx5: Fix entries checks in mlx5ibcreate_cq (bnc#858727 FATE#315946).
  • ib/mlx5: Remove per-MR pas and dma pointers (bnc#923036 FATE#318772).
  • ibmveth: calculate gso_segs for large packets (bsc#1019148).
  • ibmveth: check return of skblinearize in ibmvethstart_xmit (bsc#1019148).
  • ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
  • ibmveth: set correct gsosize and gsotype (bsc#1019148).
  • igb: Fix oops caused by missing queue pairing (bnc#857394).
  • ipmisi: create hardware-independent softdep for ipmidevintf (bsc#1009062).
  • ipr: Enable SIS pipe commands for SIS-32 devices (bsc#1016961).
  • ipv4: Fix ipqueuexmit to pass sk into iplocalout_sk (bsc#938963 FATE#319084).
  • kabi fix (bsc#1014410).
  • kabi: Whitelist KVM KABI changes resulting from adding a hcall. caused by 5246adec59458b5d325b8e1462ea9ef3ead7f6ae powerpc/pseries: Use HCLEARHPT to clear MMU hash table during kexec No problem is expected as result of changing KVM KABI so whitelisting for now. If we get some additional input from IBM we can back out the patch.
  • kabi: protect _skmem_reclaim (kabi).
  • kabi: protect struct perfeventcontext (kabi).
  • kabi: reintroduce sk_filter (kabi).
  • kbuild: Fix removal of the debian/ directory (bsc#1010213).
  • kernel: remove broken memory detection sanity check (bnc#1008567, LTC#148072).
  • kgr: ignore zombie tasks during the patching (bnc#1008979).
  • kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612).
  • kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410).
  • move the call of _ddrop(anon) into _dmaterialise_unique(dentry, anon) (bsc#984194).
  • net/mlx5: Avoid passing dma address 0 to firmware (bnc#858727 FATE#315946).
  • net/mlx5: Fix typo in mlx5queryport_pvlc (bnc#923036 FATE#318772).
  • net/mlx5e: Do not modify CQ before it was created (bnc#923036 FATE#318772).
  • net/mlx5e: Do not try to modify CQ moderation if it is not supported (bnc#923036 FATE#318772).
  • net/mlx5e: Fix MLX5E100BASET define (bnc#923036 FATE#318772).
  • net/mlx5e: Remove wrong poll CQ optimization (bnc#923036 FATE#318772).
  • netback: correct array index (bsc#983348).
  • nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
  • nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
  • ocfs2: fix BUGON() in ocfs2ci_checkpointed() (bnc#1019783).
  • powerpc/pseries: Use HCLEARHPT to clear MMU hash table during kexec (bsc#1003813).
  • reiserfs: fix race in prealloc discard (bsc#987576).
  • rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
  • rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)
  • rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)
  • serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013001).
  • serial: 8250_pci: Fix potential use-after-free in error path (bsc#1013001).
  • sfc: clear napi_hash state when copying channels (bsc#923037 FATE#318563).
  • sfc: fix potential stack corruption from running past stat bitmask (bsc#923037 FATE#318563).
  • sfc: on MC reset, clear PIO buffer linkage in TXQs (bnc#856380 FATE#315942).
  • sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
  • sunrpc: Fix reconnection timeouts (bsc#1014410).
  • sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
  • supported.conf: Add lib/*.ko to supported.conf (bsc#1019032)
  • target: Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT REACHABLE (bsc#991273).
  • target: add XCOPY target/segment desc sense codes (bsc#991273).
  • target: bounds check XCOPY segment descriptor list (bsc#991273).
  • target: bounds check XCOPY total descriptor list length (bsc#991273).
  • target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
  • target: check for XCOPY parameter truncation (bsc#991273).
  • target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).
  • target: simplify XCOPY wwn->se_dev lookup helper (bsc#991273).
  • target: support XCOPY requests without parameters (bsc#991273).
  • target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
  • target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
  • tg3: Avoid NULL pointer dereference in tg3ioerror_detected() (bsc#921778 FATE#318558).
  • tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
  • x86/apic: Order irqenter/exit() calls correctly vs. ackAPIC_irq() (bsc#1013479).
  • xen/ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
  • xenbus: correctly signal errors from xenstoredlocalinit() (luckily none so far).
  • xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).
  • xfs: refactor xlogrecoverprocess_data() (bsc#1019300).
References

Affected packages

SUSE:Linux Enterprise Desktop 12 SP1 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-default-extra": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Desktop 12 SP1 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-default-extra": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Desktop 12 SP1 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-default-extra": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Desktop 12 SP1 / kernel-xen

Package

Name
kernel-xen
Purl
purl:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-default-extra": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Live Patching 12 / kgraft-patch-SLE12-SP1_Update_12

Package

Name
kgraft-patch-SLE12-SP1_Update_12
Purl
purl:rpm/suse/kgraft-patch-SLE12-SP1_Update_12&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1-4.1

Ecosystem specific

{
    "binaries": [
        {
            "kgraft-patch-3_12_69-60_64_29-xen": "1-4.1",
            "kgraft-patch-3_12_69-60_64_29-default": "1-4.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Public Cloud 12 / kernel-ec2

Package

Name
kernel-ec2
Purl
purl:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-ec2-extra": "3.12.69-60.64.29.1",
            "kernel-ec2": "3.12.69-60.64.29.1",
            "kernel-ec2-devel": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Software Development Kit 12 SP1 / kernel-docs

Package

Name
kernel-docs
Purl
purl:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.3

Ecosystem specific

{
    "binaries": [
        {
            "kernel-docs": "3.12.69-60.64.29.3",
            "kernel-obs-build": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Software Development Kit 12 SP1 / kernel-obs-build

Package

Name
kernel-obs-build
Purl
purl:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-docs": "3.12.69-60.64.29.3",
            "kernel-obs-build": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP1 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-default-base": "3.12.69-60.64.29.1",
            "kernel-default-man": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-xen-base": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP1 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-default-base": "3.12.69-60.64.29.1",
            "kernel-default-man": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-xen-base": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP1 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-default-base": "3.12.69-60.64.29.1",
            "kernel-default-man": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-xen-base": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP1 / kernel-xen

Package

Name
kernel-xen
Purl
purl:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-default-base": "3.12.69-60.64.29.1",
            "kernel-default-man": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-xen-base": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP1 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-default-base": "3.12.69-60.64.29.1",
            "kernel-default-man": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-xen-base": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP1 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-default-base": "3.12.69-60.64.29.1",
            "kernel-default-man": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-xen-base": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP1 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-default-base": "3.12.69-60.64.29.1",
            "kernel-default-man": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-xen-base": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP1 / kernel-xen

Package

Name
kernel-xen
Purl
purl:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "3.12.69-60.64.29.1",
            "kernel-devel": "3.12.69-60.64.29.1",
            "kernel-default-base": "3.12.69-60.64.29.1",
            "kernel-default-man": "3.12.69-60.64.29.1",
            "kernel-xen-devel": "3.12.69-60.64.29.1",
            "kernel-default": "3.12.69-60.64.29.1",
            "kernel-source": "3.12.69-60.64.29.1",
            "kernel-xen-base": "3.12.69-60.64.29.1",
            "kernel-syms": "3.12.69-60.64.29.1",
            "kernel-default-devel": "3.12.69-60.64.29.1",
            "kernel-xen": "3.12.69-60.64.29.1"
        }
    ]
}

SUSE:Linux Enterprise Workstation Extension 12 SP1 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.69-60.64.29.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-extra": "3.12.69-60.64.29.1"
        }
    ]
}